Analysis
-
max time kernel
210s -
max time network
236s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:11
Behavioral task
behavioral1
Sample
556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11.exe
Resource
win7-20221111-en
General
-
Target
556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11.exe
-
Size
41KB
-
MD5
ac4cefd985abf452eb08bdfb8a2f77c7
-
SHA1
fe77f66e7a2202e586bbfc45153f9c54c4d15a4b
-
SHA256
556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11
-
SHA512
e706a6ab561aeb18f37e37a56a761249d3a0a3709e77077d8f2aee6a309f0d5e9a6c33ef92e96d97101467b90ee3177b0f4b7c8a93d618cd4586bde3f73819cc
-
SSDEEP
768:nZq4YO4rJjDcmhQ0L1bbC2VLL60Mjtur:nINrJUmhHbC+SM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
csrss.exepid process 2568 csrss.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11.exedescription pid process target process PID 428 wrote to memory of 2568 428 556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11.exe csrss.exe PID 428 wrote to memory of 2568 428 556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11.exe csrss.exe PID 428 wrote to memory of 2568 428 556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11.exe csrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11.exe"C:\Users\Admin\AppData\Local\Temp\556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Roaming\csrss.exe"C:\Users\Admin\AppData\Roaming\csrss.exe"2⤵
- Executes dropped EXE
PID:2568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5ac4cefd985abf452eb08bdfb8a2f77c7
SHA1fe77f66e7a2202e586bbfc45153f9c54c4d15a4b
SHA256556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11
SHA512e706a6ab561aeb18f37e37a56a761249d3a0a3709e77077d8f2aee6a309f0d5e9a6c33ef92e96d97101467b90ee3177b0f4b7c8a93d618cd4586bde3f73819cc
-
Filesize
41KB
MD5ac4cefd985abf452eb08bdfb8a2f77c7
SHA1fe77f66e7a2202e586bbfc45153f9c54c4d15a4b
SHA256556f30289be83a5c12777535bc1848b7b0966432500c14089d7340785f7eef11
SHA512e706a6ab561aeb18f37e37a56a761249d3a0a3709e77077d8f2aee6a309f0d5e9a6c33ef92e96d97101467b90ee3177b0f4b7c8a93d618cd4586bde3f73819cc