Analysis
-
max time kernel
162s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:46
Static task
static1
Behavioral task
behavioral1
Sample
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe
Resource
win10v2004-20221111-en
General
-
Target
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe
-
Size
92KB
-
MD5
4736f438969d72afce6a77e9da63f9a0
-
SHA1
6aceb006cf483cd9669924eff2affd520475b0a0
-
SHA256
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b
-
SHA512
1a33e9a139adf821fe1399decac0d76188ee316c89520f624759c9f6c9919e17001beaa77457dd5afdab31ea6bc7ad9d7aa18c3550bd80b3d1ee5246a98fc2f1
-
SSDEEP
1536:BawyQ/W+REElorg8/iwHdk6SzuAatLfts4V0dVnjy+Wm0eBecl1j:7Rborg8/bHdk6SzuAatLfts4KVnjy+Wg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 1076 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exepid process 1592 eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.execmd.exedescription pid process target process PID 1592 wrote to memory of 4836 1592 eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe cmd.exe PID 1592 wrote to memory of 4836 1592 eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe cmd.exe PID 1592 wrote to memory of 4836 1592 eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe cmd.exe PID 4836 wrote to memory of 1076 4836 cmd.exe tasklist.exe PID 4836 wrote to memory of 1076 4836 cmd.exe tasklist.exe PID 4836 wrote to memory of 1076 4836 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe"C:\Users\Admin\AppData\Local\Temp\eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del eb00eb301cd92f639ed0eca4d7915beab52⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1076