Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 18:52
Static task
static1
Behavioral task
behavioral1
Sample
784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe
Resource
win10v2004-20220901-en
General
-
Target
784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe
-
Size
32KB
-
MD5
81b9dd4f7928488b0961580b86064bd0
-
SHA1
e76736d1a1b668872a8dc3239ee2c89d2e37f12c
-
SHA256
784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f
-
SHA512
f00200a692044b5ac697420fbf4e72e5b09e52810baaf1f5a1c2a35f0d57682246f3c6996e707e7caac35dcb583dd8e5a41b4f9e0690d4afc3227dbed86e08db
-
SSDEEP
384:03dEZNHUX5OK5l6ZVUESCssOJvy6JB7Ep5qq+FnfjkTYYyqdCN+Or551:0NEZJ+5mUZCspqp5XojEYYyJ+s5H
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 944 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 944 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4868 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4868 wrote to memory of 3340 4868 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe 82 PID 4868 wrote to memory of 3340 4868 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe 82 PID 4868 wrote to memory of 3340 4868 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe 82 PID 3340 wrote to memory of 944 3340 cmd.exe 84 PID 3340 wrote to memory of 944 3340 cmd.exe 84 PID 3340 wrote to memory of 944 3340 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe"C:\Users\Admin\AppData\Local\Temp\784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-