Analysis
-
max time kernel
198s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:58
Static task
static1
Behavioral task
behavioral1
Sample
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe
Resource
win10v2004-20221111-en
General
-
Target
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe
-
Size
64KB
-
MD5
58b3841e1328852d18057a104a509a60
-
SHA1
28b38e7e5b51ca5a0a322fe0aa254c4f1fbf0dfb
-
SHA256
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24
-
SHA512
ef5e2ca99a5d3ee7d88472387bced54186078fd85026c04a07bb2f7be1395121882b00fc2c0df5c7b02d8e7f35c0da438552b9d3f10e741f381dbb00eec0069a
-
SSDEEP
1536:khVdbbu4f2k0iM8RiQOcDh7Rg1otiV0BPUfeMebZJ:CG4+NWOcFO0qfeTJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 4628 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exepid process 1700 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.execmd.exedescription pid process target process PID 1700 wrote to memory of 3372 1700 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe cmd.exe PID 1700 wrote to memory of 3372 1700 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe cmd.exe PID 1700 wrote to memory of 3372 1700 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe cmd.exe PID 3372 wrote to memory of 4628 3372 cmd.exe tasklist.exe PID 3372 wrote to memory of 4628 3372 cmd.exe tasklist.exe PID 3372 wrote to memory of 4628 3372 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe"C:\Users\Admin\AppData\Local\Temp\6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 6727f65c17cb0f91d4bd52ba1174df3c162⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4628