Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe
Resource
win10v2004-20220812-en
General
-
Target
dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe
-
Size
104KB
-
MD5
82a8b6ae09903787a41ad6457a2d6e10
-
SHA1
d1b0b84e91907939d758aac688dbee7d76393abb
-
SHA256
dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f
-
SHA512
e1ca64a17668a05b29f9806d4f5769af52f6f56666a3a6140b2c63c2dd23f55fd8af4eafce5da299aea449af90c667959bc0f2256b6c37f595018a604ebe9b9a
-
SSDEEP
1536:XIxb38MhDn2f+iHvnL6yId2xdMGfR9TQ2g8cifaxK2jd3psK/OV16PZdpM2Kczgm:7GiPnL6K7f3ixF2o9RH5BbtqHMOq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3352 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3352 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1496 dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1496 wrote to memory of 2844 1496 dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe 78 PID 1496 wrote to memory of 2844 1496 dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe 78 PID 1496 wrote to memory of 2844 1496 dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe 78 PID 2844 wrote to memory of 3352 2844 cmd.exe 80 PID 2844 wrote to memory of 3352 2844 cmd.exe 80 PID 2844 wrote to memory of 3352 2844 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe"C:\Users\Admin\AppData\Local\Temp\dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-