Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:00
Static task
static1
Behavioral task
behavioral1
Sample
dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe
Resource
win10v2004-20220812-en
General
-
Target
dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe
-
Size
7KB
-
MD5
52c387d66edca29d7b059f6a0c3accd0
-
SHA1
50c86c919e057630aaaea56bd864f2371ca962c3
-
SHA256
dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492
-
SHA512
4e906bcae00ac2ebd930fa1335c1538a70bfac2c8c0ab3db2341b54c119c994deed0bcf02e37eecc793e0e096c4d06bb8fd19092d61e1a7f281cea07f74aff91
-
SSDEEP
96:pQ54+WvvTbLa7v11o+WLNqszZZ1YrI3uWaDLeBomjjP:u54+Wvvf0ro3oqgGaDLI/b
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe -
Unexpected DNS network traffic destination 62 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.116.118 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.112.205 Destination IP 85.255.112.205 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 5 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exepid process 4920 ipconfig.exe 4808 ipconfig.exe 4848 ipconfig.exe 4872 ipconfig.exe 4916 ipconfig.exe -
Modifies Control Panel 2 IoCs
Processes:
dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exedescription pid process target process PID 3016 wrote to memory of 4848 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4848 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4848 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4872 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4872 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4872 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4916 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4916 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4916 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4920 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4920 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4920 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4808 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4808 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe PID 3016 wrote to memory of 4808 3016 dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe ipconfig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe"C:\Users\Admin\AppData\Local\Temp\dc2e49bf6c97e7882cdb7dd953622fb31dc01e4d7ca02196f740639236683492.exe"1⤵
- Checks computer location settings
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /flushdns2⤵
- Gathers network information
PID:4848 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /registerdns2⤵
- Gathers network information
PID:4872 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /dnsflush2⤵
- Gathers network information
PID:4916 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /renew2⤵
- Gathers network information
PID:4920 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /renew_all2⤵
- Gathers network information
PID:4808