Analysis
-
max time kernel
198s -
max time network
227s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:10
Static task
static1
Behavioral task
behavioral1
Sample
5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe
Resource
win10v2004-20221111-en
General
-
Target
5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe
-
Size
587KB
-
MD5
5c7e83e61cef93b99024fcbfa6e25bd0
-
SHA1
26da3a4c3b3921c794092a4a414c48c1c58dbce4
-
SHA256
5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1
-
SHA512
167b24e9c1e0243f3f682a591535199b87bba8cf5ef33f57d77c911ac08bbb7eefa66e11935953acad35c0a28099865decbca90689601506fdd2bad7052aba29
-
SSDEEP
12288:d5h3PhAT+T3YJZ7djjyoGt87OcaXp9TQd49K:d3PGa3YJv36EaXp9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Tcv.exepid process 3128 Tcv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe -
Drops file in System32 directory 4 IoCs
Processes:
5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Discv.dll 5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe File created C:\Windows\SysWOW64\Discv.dll 5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe File opened for modification C:\Windows\SysWOW64\Lcv_sys.exe 5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe File created C:\Windows\SysWOW64\Lcv_sys.exe 5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe -
Drops file in Windows directory 3 IoCs
Processes:
5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exeTcv.exedescription ioc process File created C:\Windows\winstart.bat 5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe File opened for modification C:\Windows\winstart.bat 5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe File created C:\Windows\winstart.bat Tcv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exedescription pid process target process PID 4188 wrote to memory of 3128 4188 5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe Tcv.exe PID 4188 wrote to memory of 3128 4188 5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe Tcv.exe PID 4188 wrote to memory of 3128 4188 5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe Tcv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe"C:\Users\Admin\AppData\Local\Temp\5ad7f277f607ba27c002dff2cd5cd4579f15c4fafb1f2fc1dac18701540610f1.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\TEMP\Tcv.exe"C:\Windows\TEMP\Tcv.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
588KB
MD55870af1b10a92178dca16451248f31b3
SHA11a989ada98902091d4bbb62f4085d59ab8d34a1d
SHA25618d93b0326a493984b3f76ef6f8699755b087e76885a863041dc051c8131d6b5
SHA512b3b105dc4193202f2912f17afa21c8bb08751cc3c026e6fd330330a30bca2742ffb3df7388554c8a211d3de25284227c8fe8c85b1bd4ea6c36433c3376b23a2c
-
Filesize
588KB
MD55870af1b10a92178dca16451248f31b3
SHA11a989ada98902091d4bbb62f4085d59ab8d34a1d
SHA25618d93b0326a493984b3f76ef6f8699755b087e76885a863041dc051c8131d6b5
SHA512b3b105dc4193202f2912f17afa21c8bb08751cc3c026e6fd330330a30bca2742ffb3df7388554c8a211d3de25284227c8fe8c85b1bd4ea6c36433c3376b23a2c