Analysis
-
max time kernel
200s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 16:55
Static task
static1
Behavioral task
behavioral1
Sample
daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe
Resource
win10v2004-20221111-en
General
-
Target
daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe
-
Size
628KB
-
MD5
2e72acda3efa39a7ddf7ead3c0683c55
-
SHA1
5d9db7fe598a3e0465687c50dbae257d6e8e44f3
-
SHA256
daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb
-
SHA512
8e188d01000aa1c58ca2e3cabefef41408360a3f2570595ca23d2ecdf82009d3a8964b7648a5321c3f13f8ef5100f16e6db7d7b67555a403d6aa3214444ee76b
-
SSDEEP
6144:Ik0E+i8egVWr8+Qcg0lOeW4woaBwzC1Ia97hwSqn2jK0Pp8DZ/EeY014HNjatshw:Ik05xEb9VIetwMQqaLieOtshidFP8jI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exedescription pid process target process PID 2296 set thread context of 3536 2296 daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1616 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1616 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exepid process 2296 daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exedaed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exedescription pid process target process PID 2296 wrote to memory of 3536 2296 daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe PID 2296 wrote to memory of 3536 2296 daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe PID 2296 wrote to memory of 3536 2296 daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe PID 2296 wrote to memory of 3536 2296 daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe PID 2296 wrote to memory of 3536 2296 daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe PID 2296 wrote to memory of 3536 2296 daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe PID 2296 wrote to memory of 3536 2296 daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe PID 2296 wrote to memory of 3536 2296 daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe PID 3536 wrote to memory of 1616 3536 daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe taskkill.exe PID 3536 wrote to memory of 1616 3536 daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe taskkill.exe PID 3536 wrote to memory of 1616 3536 daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe"C:\Users\Admin\AppData\Local\Temp\daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exeC:\Users\Admin\AppData\Local\Temp\daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe C() "C:\Users\Admin\AppData\Local\Temp\daed0c1465f04ee14cd180133751b1a10c1cda35ea7f356b25bc3a8657a1dfbb.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /IM MSASCui* /IM avg* /IM ash* /IM McSA* /IM msse*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1616