Analysis
-
max time kernel
150s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:50
Static task
static1
Behavioral task
behavioral1
Sample
110dc2cdabc3ffcc924312b44e025072ec2641bf55bdcc8abdc426ddd9e8eced.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
110dc2cdabc3ffcc924312b44e025072ec2641bf55bdcc8abdc426ddd9e8eced.exe
Resource
win10v2004-20220812-en
General
-
Target
110dc2cdabc3ffcc924312b44e025072ec2641bf55bdcc8abdc426ddd9e8eced.exe
-
Size
18KB
-
MD5
2bafc99b1f149a88044963b577385f3b
-
SHA1
01e9d48f78fee3d507f61f22de55c71cb85b7b9d
-
SHA256
110dc2cdabc3ffcc924312b44e025072ec2641bf55bdcc8abdc426ddd9e8eced
-
SHA512
5c8f8152df5c7fdde1523dfed637ef2e40b66a2e9b1ae9994024602c95f2559cfb68a444c0ea191571314088a754319f853a9182527c7f3ad7313a14a6aedc5b
-
SSDEEP
192:BE99B9FDBX6VQUesOrVHGiKbrhpoyE+Q1H638I9+51Op:BEdDt6yUes8VmfID+Q1H63Vzp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rifws.exepid process 1248 rifws.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
110dc2cdabc3ffcc924312b44e025072ec2641bf55bdcc8abdc426ddd9e8eced.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 110dc2cdabc3ffcc924312b44e025072ec2641bf55bdcc8abdc426ddd9e8eced.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
110dc2cdabc3ffcc924312b44e025072ec2641bf55bdcc8abdc426ddd9e8eced.exedescription pid process target process PID 4212 wrote to memory of 1248 4212 110dc2cdabc3ffcc924312b44e025072ec2641bf55bdcc8abdc426ddd9e8eced.exe rifws.exe PID 4212 wrote to memory of 1248 4212 110dc2cdabc3ffcc924312b44e025072ec2641bf55bdcc8abdc426ddd9e8eced.exe rifws.exe PID 4212 wrote to memory of 1248 4212 110dc2cdabc3ffcc924312b44e025072ec2641bf55bdcc8abdc426ddd9e8eced.exe rifws.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\110dc2cdabc3ffcc924312b44e025072ec2641bf55bdcc8abdc426ddd9e8eced.exe"C:\Users\Admin\AppData\Local\Temp\110dc2cdabc3ffcc924312b44e025072ec2641bf55bdcc8abdc426ddd9e8eced.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\rifws.exe"C:\Users\Admin\AppData\Local\Temp\rifws.exe"2⤵
- Executes dropped EXE
PID:1248
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5ef564ae9a091974a2b347e5bbf9d3ee4
SHA1edef201c1faf26f2669bd423e1b386896ec61acc
SHA25692f336d09b02597ad06d545e8190a03568e2760da7a13286e17098e97ffda8a1
SHA5129f685280f2577969238c537173da6506b9b0533bdae75c48281863065b6f9f27d85f1f90075c73966a26b92ce64f9539f6a6dfa40ddc649b151a80f7fda0611f
-
Filesize
18KB
MD5ef564ae9a091974a2b347e5bbf9d3ee4
SHA1edef201c1faf26f2669bd423e1b386896ec61acc
SHA25692f336d09b02597ad06d545e8190a03568e2760da7a13286e17098e97ffda8a1
SHA5129f685280f2577969238c537173da6506b9b0533bdae75c48281863065b6f9f27d85f1f90075c73966a26b92ce64f9539f6a6dfa40ddc649b151a80f7fda0611f