Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:29
Static task
static1
Behavioral task
behavioral1
Sample
6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d.exe
Resource
win10v2004-20221111-en
General
-
Target
6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d.exe
-
Size
75KB
-
MD5
3fb52b7fb6b10c98ee21ebbfe1827255
-
SHA1
34b688f407cf926cc92a92349316ab4e9917b9ae
-
SHA256
6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d
-
SHA512
e1ef7b2aadcb77bf43b6909be403c917b9166c0454f8882a87a3b3f245dbc193b4e48492eebb33828cd474b9ceb0e957b6bd01f976f4cffe22ffc4db068b0141
-
SSDEEP
1536:BbBsYVpEDyVT2eGgREZJvoFuCgq46DZkwLR:BbBvVpJ2eGgR/gq4qZkaR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d.exepid process 2564 6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d.exedescription pid process target process PID 2564 wrote to memory of 4196 2564 6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d.exe cmd.exe PID 2564 wrote to memory of 4196 2564 6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d.exe cmd.exe PID 2564 wrote to memory of 4196 2564 6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d.exe"C:\Users\Admin\AppData\Local\Temp\6b93f989a19f8f5e86f75db34e00f3d3d3bd05f649c393d2cc7ac81c8ad33f5d.exe"1⤵
- Checks computer location settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ctb..bat" > nul 2> nul2⤵PID:4196
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD50b45c74abe89f9ca9e69376e2f1bfcf4
SHA1bd9f908b20e32cdda09fe81eabae61cf729d4f16
SHA256920967a1abd16a5627407b6bd4f443d12423459ba9940554b31d5df34acafb25
SHA512602d12e1c048738d9955ab15dacb373dcbd538d3ae2c75fede0eea97151dadf047399873a6ebf7fe95b573c524fc57aba33c765a108f910638b25daa7bf96961