Analysis
-
max time kernel
178s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 19:49
Static task
static1
Behavioral task
behavioral1
Sample
023b8705df4aa5e759a9e800a61e0f18f91286d2e826f2c741324e4b8ee6e3ac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
023b8705df4aa5e759a9e800a61e0f18f91286d2e826f2c741324e4b8ee6e3ac.exe
Resource
win10v2004-20221111-en
General
-
Target
023b8705df4aa5e759a9e800a61e0f18f91286d2e826f2c741324e4b8ee6e3ac.exe
-
Size
21KB
-
MD5
570f20cf2b9043335d86584e61e42c20
-
SHA1
3642acbce841b89682d6cc2872ac976923573f29
-
SHA256
023b8705df4aa5e759a9e800a61e0f18f91286d2e826f2c741324e4b8ee6e3ac
-
SHA512
c45c1ca589645bec8ba02584d9db50afc84fe77d877b9a2dfc0d518190a0ecd5163bf4b088a1abbd3c94de0b076541a2c3c82164d966e7d3f1d75c37d1c24bdc
-
SSDEEP
384:Ax4eXupD27yKIJ9YurSVhM63M49HmU6aHgnk:sXuzKmOHnvgnk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2544 henis.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 023b8705df4aa5e759a9e800a61e0f18f91286d2e826f2c741324e4b8ee6e3ac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4984 wrote to memory of 2544 4984 023b8705df4aa5e759a9e800a61e0f18f91286d2e826f2c741324e4b8ee6e3ac.exe 83 PID 4984 wrote to memory of 2544 4984 023b8705df4aa5e759a9e800a61e0f18f91286d2e826f2c741324e4b8ee6e3ac.exe 83 PID 4984 wrote to memory of 2544 4984 023b8705df4aa5e759a9e800a61e0f18f91286d2e826f2c741324e4b8ee6e3ac.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\023b8705df4aa5e759a9e800a61e0f18f91286d2e826f2c741324e4b8ee6e3ac.exe"C:\Users\Admin\AppData\Local\Temp\023b8705df4aa5e759a9e800a61e0f18f91286d2e826f2c741324e4b8ee6e3ac.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\henis.exe"C:\Users\Admin\AppData\Local\Temp\henis.exe"2⤵
- Executes dropped EXE
PID:2544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5d6199b5eb0251b1ce614ff510d6ddd81
SHA1df9f084dfa2f528541003c4ed5ad72a64c7e25d5
SHA25605572a90723c35312b1eede19c8f79028babfa24a4058b9158cfd7803acb9b45
SHA51229a3f9f223dbc2a960106d48e0f0cc920c2728bf706fc03ed30e17a2cd9f17227ebd2fbfadd9ba3cdd8b7e44f9b926f4a9731785dd8dc72ac9cadebe89eb0f82
-
Filesize
21KB
MD5d6199b5eb0251b1ce614ff510d6ddd81
SHA1df9f084dfa2f528541003c4ed5ad72a64c7e25d5
SHA25605572a90723c35312b1eede19c8f79028babfa24a4058b9158cfd7803acb9b45
SHA51229a3f9f223dbc2a960106d48e0f0cc920c2728bf706fc03ed30e17a2cd9f17227ebd2fbfadd9ba3cdd8b7e44f9b926f4a9731785dd8dc72ac9cadebe89eb0f82