Analysis
-
max time kernel
237s -
max time network
254s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 03:23
Static task
static1
Behavioral task
behavioral1
Sample
fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe
Resource
win10v2004-20221111-en
General
-
Target
fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe
-
Size
645KB
-
MD5
398a75ee8a26f0ef0a9cfad14291c3af
-
SHA1
6c515db9557f3256e681fda198cb45c034d01658
-
SHA256
fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8
-
SHA512
e3beddb7435300d413ea11edaad14359ea6e262e8cdc201d260a832cf6b4f0c62259a996248337f15b57ca76a19a7ef2a984683461dd6620deb64998a3c246b6
-
SSDEEP
12288:dXrWlNSpKL/HaQ/82Q3E4RSDnDiLs4C4a7rHNEu34RC2bjpZJYD:duSgLCQ/8H3E4RSbme7rF34RC2FYD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4536 fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe 4536 fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe 756 winlogon.exe 756 winlogon.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4536 fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4536 fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe Token: SeDebugPrivilege 756 winlogon.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4536 wrote to memory of 756 4536 fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe 81 PID 4536 wrote to memory of 756 4536 fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe"C:\Users\Admin\AppData\Local\Temp\fcd25a11ef8ebc61519d66fbf7a0edfcbb4bd9a6b0723993bff99462050011a8.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756
-