Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:08
Static task
static1
Behavioral task
behavioral1
Sample
5a189d57775d13eaa7e2cf5c461dffa4ac61baca5abc3a3835cef2a1c0aac91c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5a189d57775d13eaa7e2cf5c461dffa4ac61baca5abc3a3835cef2a1c0aac91c.exe
Resource
win10v2004-20220901-en
General
-
Target
5a189d57775d13eaa7e2cf5c461dffa4ac61baca5abc3a3835cef2a1c0aac91c.exe
-
Size
168KB
-
MD5
b06d8708ce180fd6963d94f530303058
-
SHA1
f60c0c2a9ff177dd606aa96175fa96b17714c238
-
SHA256
5a189d57775d13eaa7e2cf5c461dffa4ac61baca5abc3a3835cef2a1c0aac91c
-
SHA512
5b9e601b074be5718458a7ede9394ec82bbb972cd0da63dc643a05b96ced93e0cd682237fb72f91d7a14890d856e788ce07c271636a1db9a672a1e7036660cae
-
SSDEEP
1536:TCl8jequo9Qtr/OLMf1Y8hitviXrSkuDM5QSOK:TPjw1/OLiYZoSk+Md
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
LocalteRpknufjC.exeSystem Idle Process.exepid process 2212 LocalteRpknufjC.exe 4940 System Idle Process.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5a189d57775d13eaa7e2cf5c461dffa4ac61baca5abc3a3835cef2a1c0aac91c.exeLocalteRpknufjC.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 5a189d57775d13eaa7e2cf5c461dffa4ac61baca5abc3a3835cef2a1c0aac91c.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation LocalteRpknufjC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
5a189d57775d13eaa7e2cf5c461dffa4ac61baca5abc3a3835cef2a1c0aac91c.exeLocalteRpknufjC.exeSystem Idle Process.exedescription pid process target process PID 4152 wrote to memory of 2212 4152 5a189d57775d13eaa7e2cf5c461dffa4ac61baca5abc3a3835cef2a1c0aac91c.exe LocalteRpknufjC.exe PID 4152 wrote to memory of 2212 4152 5a189d57775d13eaa7e2cf5c461dffa4ac61baca5abc3a3835cef2a1c0aac91c.exe LocalteRpknufjC.exe PID 4152 wrote to memory of 2212 4152 5a189d57775d13eaa7e2cf5c461dffa4ac61baca5abc3a3835cef2a1c0aac91c.exe LocalteRpknufjC.exe PID 2212 wrote to memory of 4940 2212 LocalteRpknufjC.exe System Idle Process.exe PID 2212 wrote to memory of 4940 2212 LocalteRpknufjC.exe System Idle Process.exe PID 2212 wrote to memory of 4940 2212 LocalteRpknufjC.exe System Idle Process.exe PID 4940 wrote to memory of 2356 4940 System Idle Process.exe netsh.exe PID 4940 wrote to memory of 2356 4940 System Idle Process.exe netsh.exe PID 4940 wrote to memory of 2356 4940 System Idle Process.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a189d57775d13eaa7e2cf5c461dffa4ac61baca5abc3a3835cef2a1c0aac91c.exe"C:\Users\Admin\AppData\Local\Temp\5a189d57775d13eaa7e2cf5c461dffa4ac61baca5abc3a3835cef2a1c0aac91c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\LocalteRpknufjC.exe"C:\Users\Admin\AppData\LocalteRpknufjC.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Roaming\System Idle Process.exe"C:\Users\Admin\AppData\Roaming\System Idle Process.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\System Idle Process.exe" "System Idle Process.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:2356
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD536fab9add490f06b900219718b0cfe11
SHA112f52e7ac9b8f1f5ec709262bb71a2865fe24ec1
SHA256293c27a0817c2900910ed538d4cc54faa62318ae58a6c6d6b74e0080da4fd5f7
SHA512f885787bb9c8bea1fa10b8126ced82242c25c11acb59ec68062f9cb41b0dfb4c07b41d012251733ec9a1dd63e7a6ba33dd771a0f70b6060c4fddcdd2845f7de7
-
Filesize
10KB
MD536fab9add490f06b900219718b0cfe11
SHA112f52e7ac9b8f1f5ec709262bb71a2865fe24ec1
SHA256293c27a0817c2900910ed538d4cc54faa62318ae58a6c6d6b74e0080da4fd5f7
SHA512f885787bb9c8bea1fa10b8126ced82242c25c11acb59ec68062f9cb41b0dfb4c07b41d012251733ec9a1dd63e7a6ba33dd771a0f70b6060c4fddcdd2845f7de7
-
Filesize
10KB
MD536fab9add490f06b900219718b0cfe11
SHA112f52e7ac9b8f1f5ec709262bb71a2865fe24ec1
SHA256293c27a0817c2900910ed538d4cc54faa62318ae58a6c6d6b74e0080da4fd5f7
SHA512f885787bb9c8bea1fa10b8126ced82242c25c11acb59ec68062f9cb41b0dfb4c07b41d012251733ec9a1dd63e7a6ba33dd771a0f70b6060c4fddcdd2845f7de7
-
Filesize
10KB
MD536fab9add490f06b900219718b0cfe11
SHA112f52e7ac9b8f1f5ec709262bb71a2865fe24ec1
SHA256293c27a0817c2900910ed538d4cc54faa62318ae58a6c6d6b74e0080da4fd5f7
SHA512f885787bb9c8bea1fa10b8126ced82242c25c11acb59ec68062f9cb41b0dfb4c07b41d012251733ec9a1dd63e7a6ba33dd771a0f70b6060c4fddcdd2845f7de7