Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:16
Static task
static1
Behavioral task
behavioral1
Sample
a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exe
Resource
win10v2004-20220812-en
General
-
Target
a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exe
-
Size
48KB
-
MD5
433f0cc7c95d9d6c3ffc470c95cbb9f3
-
SHA1
7bb7ee9268bd4abe6b08375b0d3e64cb6633b3a1
-
SHA256
a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63
-
SHA512
3c1da7cc7c740604e28d5b8cb7adb545192533f80a2061ffeecd9108ee4f6c3077e65237b4e865c16f07ba57801235ccd7ff6dc32ea85ff9998ee9d8d17d22d6
-
SSDEEP
768:YJSHHO6Fj2wWqWVqY/QQQVuCQCVPwH+ObWOxJ:bu0CVpQjjV7OCCJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 4220 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exepid process 5056 a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exe 5056 a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.execmd.exedescription pid process target process PID 5056 wrote to memory of 892 5056 a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exe cmd.exe PID 5056 wrote to memory of 892 5056 a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exe cmd.exe PID 5056 wrote to memory of 892 5056 a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exe cmd.exe PID 892 wrote to memory of 4220 892 cmd.exe tasklist.exe PID 892 wrote to memory of 4220 892 cmd.exe tasklist.exe PID 892 wrote to memory of 4220 892 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exe"C:\Users\Admin\AppData\Local\Temp\a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del a51071fbc841a1c6505db206ae47703375e724fa4d50b64c56ecfa199aef7a63.exe2⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4220