Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:24
Static task
static1
Behavioral task
behavioral1
Sample
699ffe932b40015c74f2d232a1440bfd29e68aea7d079204239030fc112faefe.exe
Resource
win10v2004-20220901-en
General
-
Target
699ffe932b40015c74f2d232a1440bfd29e68aea7d079204239030fc112faefe.exe
-
Size
1.8MB
-
MD5
a6638ff20c2b4f88a62063835c6d6d83
-
SHA1
de208d6c257e6d83ee1e39a969032b38ac441b41
-
SHA256
699ffe932b40015c74f2d232a1440bfd29e68aea7d079204239030fc112faefe
-
SHA512
964791710fde4cc6f641414bb480191e6e6d149fa458536c6651f7e963c5f63202fd7e0a6e09dd8893db1cda3e2c3bdd588f8affdeb20dc60431fe6076d44dce
-
SSDEEP
24576:rconAINPy/C1G8XWPxbXhLQJdNX3ztMSOQal2mmsT8/rIk8OWnjtyYMyVQwfaVqa:bRxU5pTJOX3vCQdDIk8OWjATwz/8r
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
699ffe932b40015c74f2d232a1440bfd29e68aea7d079204239030fc112faefe.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 699ffe932b40015c74f2d232a1440bfd29e68aea7d079204239030fc112faefe.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 4328 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
699ffe932b40015c74f2d232a1440bfd29e68aea7d079204239030fc112faefe.exedescription pid process target process PID 4372 wrote to memory of 4328 4372 699ffe932b40015c74f2d232a1440bfd29e68aea7d079204239030fc112faefe.exe regsvr32.exe PID 4372 wrote to memory of 4328 4372 699ffe932b40015c74f2d232a1440bfd29e68aea7d079204239030fc112faefe.exe regsvr32.exe PID 4372 wrote to memory of 4328 4372 699ffe932b40015c74f2d232a1440bfd29e68aea7d079204239030fc112faefe.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\699ffe932b40015c74f2d232a1440bfd29e68aea7d079204239030fc112faefe.exe"C:\Users\Admin\AppData\Local\Temp\699ffe932b40015c74f2d232a1440bfd29e68aea7d079204239030fc112faefe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /u /S .\TY8IYP.fEF2⤵
- Loads dropped DLL
PID:4328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5373864f404943664ac8146c1c2c698b7
SHA18248b88a3decdaf977a30c0fa2ab992aadb70d73
SHA25670f72ac145ee42fda83225021f9ed295fecf0522902b39ad0a5c9bb0d5844614
SHA512a36aaaebaa29d6b2b337078607112eb731e3d0501afbd9185baace34c221aa78198cbdd01789e784d8af16cc8a0e5028c831fd3d842c8dfe7e082bcac3080253
-
Filesize
1.7MB
MD5373864f404943664ac8146c1c2c698b7
SHA18248b88a3decdaf977a30c0fa2ab992aadb70d73
SHA25670f72ac145ee42fda83225021f9ed295fecf0522902b39ad0a5c9bb0d5844614
SHA512a36aaaebaa29d6b2b337078607112eb731e3d0501afbd9185baace34c221aa78198cbdd01789e784d8af16cc8a0e5028c831fd3d842c8dfe7e082bcac3080253