Analysis
-
max time kernel
166s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:23
Static task
static1
Behavioral task
behavioral1
Sample
d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711.exe
Resource
win10v2004-20220812-en
General
-
Target
d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711.exe
-
Size
1.7MB
-
MD5
e79be00e6684247db2bd6ab49cba1e3f
-
SHA1
96c4f2eeee0cfecc8658d3e17dd607081eb2b101
-
SHA256
d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711
-
SHA512
acdb105f281b515dcae0b69d35c60737761a59025097167d9800f9cdd2819625a725ef5589a3527c6985e44298d88c4d3675bc0deb0e6c105856dddc8cccac35
-
SSDEEP
49152:KyNvFE3c+0dR3rI+MnFZFVkpRR5fhFzu+9Uq+C:KyNvFE3c+0dR3rkH3M5fhRu+Gq+C
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1448 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711.exedescription pid process target process PID 4828 wrote to memory of 1448 4828 d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711.exe regsvr32.exe PID 4828 wrote to memory of 1448 4828 d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711.exe regsvr32.exe PID 4828 wrote to memory of 1448 4828 d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711.exe"C:\Users\Admin\AppData\Local\Temp\d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -u GMLMCPMT.DaX -S2⤵
- Loads dropped DLL
PID:1448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD52dbbbb50d7ad4990d123ada62331c270
SHA1cb169bb33db859f7366fd5b9f166b536c296f242
SHA2567d75fef8179c81eca4e2d0e9773443d33487b6300d7d14316dfdc37c8fc6c8c3
SHA512ca243c212d27b4f43c540646ace91f1009ed3f472a0b56d2e904f2c96677a24941862f179195bad9da753fb3114e0205670f2915ba0e0631252333a23a661c41
-
Filesize
1.7MB
MD52dbbbb50d7ad4990d123ada62331c270
SHA1cb169bb33db859f7366fd5b9f166b536c296f242
SHA2567d75fef8179c81eca4e2d0e9773443d33487b6300d7d14316dfdc37c8fc6c8c3
SHA512ca243c212d27b4f43c540646ace91f1009ed3f472a0b56d2e904f2c96677a24941862f179195bad9da753fb3114e0205670f2915ba0e0631252333a23a661c41