Analysis
-
max time kernel
36s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 17:13
Static task
static1
Behavioral task
behavioral1
Sample
8ede2e46a4d55f292976ea13be4dee5ad2805b2d9e6d0553c5e4e70667c8d2c6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ede2e46a4d55f292976ea13be4dee5ad2805b2d9e6d0553c5e4e70667c8d2c6.exe
Resource
win10v2004-20221111-en
General
-
Target
8ede2e46a4d55f292976ea13be4dee5ad2805b2d9e6d0553c5e4e70667c8d2c6.exe
-
Size
28KB
-
MD5
3786a47d907df1ba69702716d890a720
-
SHA1
10f9810684580c0e7de9c6517d645fae7312b88c
-
SHA256
8ede2e46a4d55f292976ea13be4dee5ad2805b2d9e6d0553c5e4e70667c8d2c6
-
SHA512
6978528fb997ba37379e37018b1001dd7b374eaa783c593fa02c25e043a1218b9bdef78e97a5567a9fc7d136f1077a141705ce296c04544763d88c3bb346b623
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVajSrv:X6QFElP6n+gJQMOtEvwDpjBcS7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 8ede2e46a4d55f292976ea13be4dee5ad2805b2d9e6d0553c5e4e70667c8d2c6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2208 1836 8ede2e46a4d55f292976ea13be4dee5ad2805b2d9e6d0553c5e4e70667c8d2c6.exe 83 PID 1836 wrote to memory of 2208 1836 8ede2e46a4d55f292976ea13be4dee5ad2805b2d9e6d0553c5e4e70667c8d2c6.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ede2e46a4d55f292976ea13be4dee5ad2805b2d9e6d0553c5e4e70667c8d2c6.exe"C:\Users\Admin\AppData\Local\Temp\8ede2e46a4d55f292976ea13be4dee5ad2805b2d9e6d0553c5e4e70667c8d2c6.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵PID:2208
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5d440a891ab7538b1a8a8caec2262a311
SHA179e3acc9accf2a230a15e881f66ff591a34415f0
SHA256ded5fcbbf094ec59d6c40329d718bd8d0b4c7b9905caa3ab1378bfb79c264405
SHA512e1864a154f3a26bcea69e4e521bd1c3c65a7442d452bce6554e704d86d04ec302945c3fe3b927e7bc8cc03b38e84325058be03a916737a8b5276e32fa3757328
-
Filesize
28KB
MD5d440a891ab7538b1a8a8caec2262a311
SHA179e3acc9accf2a230a15e881f66ff591a34415f0
SHA256ded5fcbbf094ec59d6c40329d718bd8d0b4c7b9905caa3ab1378bfb79c264405
SHA512e1864a154f3a26bcea69e4e521bd1c3c65a7442d452bce6554e704d86d04ec302945c3fe3b927e7bc8cc03b38e84325058be03a916737a8b5276e32fa3757328