Analysis
-
max time kernel
268s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 07:00
Static task
static1
Behavioral task
behavioral1
Sample
UBABALO GRACIFIED.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
UBABALO GRACIFIED.exe
Resource
win10v2004-20221111-en
General
-
Target
UBABALO GRACIFIED.exe
-
Size
2.2MB
-
MD5
447a97e33d36fd65f45fd780a2694097
-
SHA1
bec9baf1f773fccfedf6b7f4b2f68482d9921b07
-
SHA256
96c227a95417ea3bb0c39c952b0b0709f62a525340ea402e5b3af59beba3c6ef
-
SHA512
02a5f607906c909f38c22c9ede990695fe57fff987f547308a1a628684a4d3fff07103e4657b53c98ab67778807e880c6549cae8d937fe5eb37681f7cd8096e9
-
SSDEEP
24576:PT/blbMca5Dm5CJ0O0z7wdhS4H4sWS9g0F4LbyN1AQDEJa9oTojuOJoEhcTGvp1n:PTjlIca51SO0IddEWev3QQYfWo283
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
UBABALO GRACIFIED.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation UBABALO GRACIFIED.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2652 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
UBABALO GRACIFIED.exepowershell.exedescription pid process Token: SeDebugPrivilege 3104 UBABALO GRACIFIED.exe Token: SeDebugPrivilege 2652 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
UBABALO GRACIFIED.exedescription pid process target process PID 3104 wrote to memory of 2652 3104 UBABALO GRACIFIED.exe powershell.exe PID 3104 wrote to memory of 2652 3104 UBABALO GRACIFIED.exe powershell.exe PID 3104 wrote to memory of 2652 3104 UBABALO GRACIFIED.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UBABALO GRACIFIED.exe"C:\Users\Admin\AppData\Local\Temp\UBABALO GRACIFIED.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652