Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:01
Static task
static1
Behavioral task
behavioral1
Sample
0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exe
Resource
win10v2004-20220812-en
General
-
Target
0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exe
-
Size
41KB
-
MD5
a956d85b9765c9eb1ae2d7f9e1aceaf9
-
SHA1
9275f655f73d3ea0e6d5e507ef060b1dcdbea6f8
-
SHA256
0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d
-
SHA512
aabc9c8f5606b3ae958019bd8aa387ac7ad81bb92e437c28a442a914a40f59e6eefafdbaf0424eea219521d23d5f9249833883779554a490125a996d33e4ce87
-
SSDEEP
768:QIBar1ZIZYnfI9opm6AIHIjaI7g9mVmUnmoNE/W5dRV8:pW1ZIZqI9opm6AIHIjzmUHNzd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
sxhost.exepid process 5060 sxhost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exesxhost.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation sxhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exesxhost.exedescription pid process target process PID 976 wrote to memory of 5060 976 0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exe sxhost.exe PID 976 wrote to memory of 5060 976 0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exe sxhost.exe PID 976 wrote to memory of 5060 976 0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exe sxhost.exe PID 976 wrote to memory of 5004 976 0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exe cmd.exe PID 976 wrote to memory of 5004 976 0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exe cmd.exe PID 976 wrote to memory of 5004 976 0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exe cmd.exe PID 5060 wrote to memory of 4840 5060 sxhost.exe cmd.exe PID 5060 wrote to memory of 4840 5060 sxhost.exe cmd.exe PID 5060 wrote to memory of 4840 5060 sxhost.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exe"C:\Users\Admin\AppData\Local\Temp\0e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\sxhost.exe"C:\Users\Admin\sxhost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\sxhost.exe >> NUL3⤵PID:4840
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\0E4186~1.EXE >> NUL2⤵PID:5004
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5a956d85b9765c9eb1ae2d7f9e1aceaf9
SHA19275f655f73d3ea0e6d5e507ef060b1dcdbea6f8
SHA2560e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d
SHA512aabc9c8f5606b3ae958019bd8aa387ac7ad81bb92e437c28a442a914a40f59e6eefafdbaf0424eea219521d23d5f9249833883779554a490125a996d33e4ce87
-
Filesize
41KB
MD5a956d85b9765c9eb1ae2d7f9e1aceaf9
SHA19275f655f73d3ea0e6d5e507ef060b1dcdbea6f8
SHA2560e4186cb4d4ca05b128dab491efc9987026f34bd2d1e9168fd03702132bba29d
SHA512aabc9c8f5606b3ae958019bd8aa387ac7ad81bb92e437c28a442a914a40f59e6eefafdbaf0424eea219521d23d5f9249833883779554a490125a996d33e4ce87