Analysis
-
max time kernel
112s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
f8a0a3d4ad79e23736535829dad3da44aa7a352a14bfc2acdc94d5afc70b3da7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f8a0a3d4ad79e23736535829dad3da44aa7a352a14bfc2acdc94d5afc70b3da7.exe
Resource
win10v2004-20220812-en
General
-
Target
f8a0a3d4ad79e23736535829dad3da44aa7a352a14bfc2acdc94d5afc70b3da7.exe
-
Size
60KB
-
MD5
310742abcb253eb9b0a16ed2097d2710
-
SHA1
d8202ddb0aab7371af7fe0ecdbbe4bb82404063f
-
SHA256
f8a0a3d4ad79e23736535829dad3da44aa7a352a14bfc2acdc94d5afc70b3da7
-
SHA512
1f069c0b95d476b9f6546415453e7682b431ec4aa4afbc6c0618ae9bb8148c321048fa02cbb05e8ecd3c290d7bfaf34f6a4539e4e6df4f5b9ffbf4c4ae6f5add
-
SSDEEP
768:6p16Fltfq6G087m9kkewnowfd00hXXofDpqFHz/YBvVWy:416FltfZG0Roy3XobpCTMNB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation f8a0a3d4ad79e23736535829dad3da44aa7a352a14bfc2acdc94d5afc70b3da7.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f8a0a3d4ad79e23736535829dad3da44aa7a352a14bfc2acdc94d5afc70b3da7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f8a0a3d4ad79e23736535829dad3da44aa7a352a14bfc2acdc94d5afc70b3da7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4624 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4624 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1408 f8a0a3d4ad79e23736535829dad3da44aa7a352a14bfc2acdc94d5afc70b3da7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1596 1408 f8a0a3d4ad79e23736535829dad3da44aa7a352a14bfc2acdc94d5afc70b3da7.exe 79 PID 1408 wrote to memory of 1596 1408 f8a0a3d4ad79e23736535829dad3da44aa7a352a14bfc2acdc94d5afc70b3da7.exe 79 PID 1408 wrote to memory of 1596 1408 f8a0a3d4ad79e23736535829dad3da44aa7a352a14bfc2acdc94d5afc70b3da7.exe 79 PID 1596 wrote to memory of 4624 1596 cmd.exe 81 PID 1596 wrote to memory of 4624 1596 cmd.exe 81 PID 1596 wrote to memory of 4624 1596 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8a0a3d4ad79e23736535829dad3da44aa7a352a14bfc2acdc94d5afc70b3da7.exe"C:\Users\Admin\AppData\Local\Temp\f8a0a3d4ad79e23736535829dad3da44aa7a352a14bfc2acdc94d5afc70b3da7.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del f8a0a3d4ad79e23736535829dad3da44aa2⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-