Analysis
-
max time kernel
187s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe
Resource
win10v2004-20220812-en
General
-
Target
79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe
-
Size
172KB
-
MD5
60a7a8b1c78cb2ed4becd00a6456dbc8
-
SHA1
09bd14a2853b5f5a8babbdd552a4953c43c2f483
-
SHA256
79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56
-
SHA512
09b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6
-
SSDEEP
3072:iJ0A2KvUXh9O5P908zsStvqeSwCKx83lUICxsqcAeSQ:i0A2auu10usSJbuKxAlicbS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 3640 svchost.exe 5080 svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Config\ = e6070b00030017000b0003001700d200 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Config svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
svchost.exepid process 5080 svchost.exe 5080 svchost.exe 5080 svchost.exe 5080 svchost.exe 5080 svchost.exe 5080 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exedescription pid process Token: SeBackupPrivilege 5080 svchost.exe Token: SeRestorePrivilege 5080 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exedescription pid process target process PID 5004 wrote to memory of 3640 5004 79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe svchost.exe PID 5004 wrote to memory of 3640 5004 79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe svchost.exe PID 5004 wrote to memory of 3640 5004 79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe svchost.exe PID 5004 wrote to memory of 5008 5004 79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe cmd.exe PID 5004 wrote to memory of 5008 5004 79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe cmd.exe PID 5004 wrote to memory of 5008 5004 79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe"C:\Users\Admin\AppData\Local\Temp\79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\temp\svchost.exe"C:\Windows\temp\svchost.exe" -install2⤵
- Executes dropped EXE
PID:3640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\~0.bat" "2⤵PID:5008
-
C:\Windows\temp\svchost.exeC:\Windows\temp\svchost.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258B
MD5a9d9e7069fee2197452e6bfdd806e851
SHA10ce3a2040fce0a3f7dfc0f4ec5a6c66240063c12
SHA2568e0e0f2c1b3df7f15def6cc9e9e0735e75fb9e5952e33a103c65f6e12d8ab151
SHA512440a8f8e201080e759aa407577b8c36467aad5d7edb0d4bfe7a05a8bc7466c096113e47b32dfc660b3e8112889cf51e881ae31fe760b39b78459af4cad18a03d
-
Filesize
172KB
MD560a7a8b1c78cb2ed4becd00a6456dbc8
SHA109bd14a2853b5f5a8babbdd552a4953c43c2f483
SHA25679a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56
SHA51209b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6
-
Filesize
172KB
MD560a7a8b1c78cb2ed4becd00a6456dbc8
SHA109bd14a2853b5f5a8babbdd552a4953c43c2f483
SHA25679a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56
SHA51209b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6
-
Filesize
172KB
MD560a7a8b1c78cb2ed4becd00a6456dbc8
SHA109bd14a2853b5f5a8babbdd552a4953c43c2f483
SHA25679a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56
SHA51209b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6