Analysis
-
max time kernel
150s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:29
Static task
static1
Behavioral task
behavioral1
Sample
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe
Resource
win10v2004-20221111-en
General
-
Target
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe
-
Size
84KB
-
MD5
53777ced2ba1455ea1f9f307997456a0
-
SHA1
ab987edad8b08b0971b3569b9be6ff8d1a22ea22
-
SHA256
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610
-
SHA512
8ae3a4a194bd71a2bf6fa903c6825e22833e518744d46e25bc1b3cbd599b12216a6047820a6eef9eee9de3c92a500f29a3beeca2461d65e913425f1472d5e6ea
-
SSDEEP
1536:mewr+Ucxh6cbsR8ZW8XScmFroZUdjINPQuoL:33xj/lmtdsJfC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 2952 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exepid process 2056 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.execmd.exedescription pid process target process PID 2056 wrote to memory of 4824 2056 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe cmd.exe PID 2056 wrote to memory of 4824 2056 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe cmd.exe PID 2056 wrote to memory of 4824 2056 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe cmd.exe PID 4824 wrote to memory of 2952 4824 cmd.exe tasklist.exe PID 4824 wrote to memory of 2952 4824 cmd.exe tasklist.exe PID 4824 wrote to memory of 2952 4824 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe"C:\Users\Admin\AppData\Local\Temp\7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2952