Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe
Resource
win10v2004-20220812-en
General
-
Target
2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe
-
Size
28KB
-
MD5
328e6e941b66ec19b4f581d214dbb272
-
SHA1
ceb071b95477d10d21b7fe553920b818d0b23e76
-
SHA256
2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8
-
SHA512
2c4200653b1a9f2b13294527f1ce6459fd90e919595d9214e36c5decb4b733e215af6d4fd59769e02aa7047bfdb880ce000c36e72c406c03c576c017a430fd5e
-
SSDEEP
384:/T+UxLd9sn+G+DLuz+7C+EA3TzzQKXYFlzQKXvFlTGHl3ptDr4qYso7:/S8Lrs9/zzqvzQvQqGHJsqk
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3520 2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3520 wrote to memory of 4252 3520 2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe 81 PID 3520 wrote to memory of 4252 3520 2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe 81 PID 3520 wrote to memory of 4252 3520 2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe 81 PID 4252 wrote to memory of 3032 4252 cmd.exe 83 PID 4252 wrote to memory of 3032 4252 cmd.exe 83 PID 4252 wrote to memory of 3032 4252 cmd.exe 83 PID 3520 wrote to memory of 1320 3520 2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe 84 PID 3520 wrote to memory of 1320 3520 2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe 84 PID 3520 wrote to memory of 1320 3520 2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe 84 PID 1320 wrote to memory of 4776 1320 cmd.exe 86 PID 1320 wrote to memory of 4776 1320 cmd.exe 86 PID 1320 wrote to memory of 4776 1320 cmd.exe 86 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3032 attrib.exe 4776 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe"C:\Users\Admin\AppData\Local\Temp\2e8c41f782f2440d66163eae97c993eefeb785737076efbfddd6178975044db8.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SE.bat" 0"2⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\SysWOW64\attrib.exeattrib -r C:\Windows\system32\drivers\etc\hosts3⤵
- Views/modifies file attributes
PID:3032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SL.bat" 0"2⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\attrib.exeattrib +r C:\Windows\system32\drivers\etc\hosts3⤵
- Views/modifies file attributes
PID:4776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49B
MD5d013cc282f8c7dd36aa46b9db97f14ca
SHA11d6d23a62127302e4a6409aaa45902186bccf552
SHA25646eec18440b6879e3271fb55049330c6c33a89131a0d4bd57631e4633d1d59d0
SHA512c171985b9aa7dcb19590e5c40c4512a02776afb67abfc1b984112a5ce6e3a0ad6db61ea3851dbf2b6f5f0ad0495b4b9c33015bfc68a9bb16b46c40c6363705e6
-
Filesize
49B
MD5e271e0a233b644da15be208de2a9aae1
SHA1732d068d81bcdf50709be42245264e3c0b7670e8
SHA25619951fc879d9c1ca5b53d0451539ec2e5bbdaa6cc3dada46194aded4cc1b8054
SHA512edc34083fadcdc9d1b78696b60faa40f75ef7f0f53ee1cd523b87005267f217d00171a13ae9308c42efdaf19e90c1d6526342ceb9a4dedefeeb0d59f2b5f0473