Analysis
-
max time kernel
340s -
max time network
387s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:07
Static task
static1
Behavioral task
behavioral1
Sample
af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2.exe
Resource
win10v2004-20221111-en
General
-
Target
af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2.exe
-
Size
1.6MB
-
MD5
49b109aa33b67e7575502167cafc3ee4
-
SHA1
95b8cc269544c16a3cddf7c3c2c02faa2ab2270e
-
SHA256
af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2
-
SHA512
172f7320d97ccc8e9777dc053c4896bedb913de608541eff74423ea64c7d287675baf2a62c97e997729906171cfbb23e1d804fe5e56d8bd174366f3c82a6a562
-
SSDEEP
24576:b062cSEk8zNlLBtW/BXgJWNnh5F9UPdxVi3wJZiTPEYZe6RWJLODQtcHNSuxd3f+:A6PaYWJXzNnhDisAJZiwYZvQpu/vz/i
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2080 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2.execontrol.exedescription pid process target process PID 3576 wrote to memory of 3452 3576 af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2.exe control.exe PID 3576 wrote to memory of 3452 3576 af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2.exe control.exe PID 3576 wrote to memory of 3452 3576 af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2.exe control.exe PID 3452 wrote to memory of 2080 3452 control.exe rundll32.exe PID 3452 wrote to memory of 2080 3452 control.exe rundll32.exe PID 3452 wrote to memory of 2080 3452 control.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2.exe"C:\Users\Admin\AppData\Local\Temp\af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\XM46.8S2⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\XM46.8S3⤵
- Loads dropped DLL
PID:2080
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD52d651abc49d33447713b0fd34f221ae8
SHA1a20738055f2e9e14baec621d9c0f2fee612414ed
SHA256631576338236d320ffffe02311493bad49605b5b93fe7a227888553de26ee35b
SHA512d37ad62467e3bfb0aa39c8e593b53453f4f69868cc5e5f40256d96809410921171edb8882d0749d763538c5ef9a48ffaff7d59da48e8c9412abc856115a17c1e
-
Filesize
1.7MB
MD52d651abc49d33447713b0fd34f221ae8
SHA1a20738055f2e9e14baec621d9c0f2fee612414ed
SHA256631576338236d320ffffe02311493bad49605b5b93fe7a227888553de26ee35b
SHA512d37ad62467e3bfb0aa39c8e593b53453f4f69868cc5e5f40256d96809410921171edb8882d0749d763538c5ef9a48ffaff7d59da48e8c9412abc856115a17c1e