Analysis
-
max time kernel
93s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 04:26
Static task
static1
Behavioral task
behavioral1
Sample
e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe
Resource
win10v2004-20220812-en
General
-
Target
e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe
-
Size
289KB
-
MD5
abebadcbd408b974a4e7c2a2a9163d00
-
SHA1
6aab036656bd7dd551516a57a1132eec2971dfba
-
SHA256
e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e
-
SHA512
d1e4ee4ac6d2787e30baec0aa9ea961eed313b4d19ead0944bb152df732fbf3c727a3394a999fed773165a51ca78ecf8460d106cb908a91d6475e85560d558f7
-
SSDEEP
6144:706NYAN2IsG4ll713fr70acFbca+tYkxph+i:7pNB/wj713fro1RGikxpI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exedescription pid process target process PID 3996 set thread context of 2024 3996 e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exepid process 3996 e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exenet.exedescription pid process target process PID 3996 wrote to memory of 3452 3996 e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe net.exe PID 3996 wrote to memory of 3452 3996 e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe net.exe PID 3996 wrote to memory of 3452 3996 e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe net.exe PID 3452 wrote to memory of 3552 3452 net.exe net1.exe PID 3452 wrote to memory of 3552 3452 net.exe net1.exe PID 3452 wrote to memory of 3552 3452 net.exe net1.exe PID 3996 wrote to memory of 2024 3996 e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe PID 3996 wrote to memory of 2024 3996 e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe PID 3996 wrote to memory of 2024 3996 e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe PID 3996 wrote to memory of 2024 3996 e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe PID 3996 wrote to memory of 2024 3996 e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe PID 3996 wrote to memory of 2024 3996 e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe PID 3996 wrote to memory of 2024 3996 e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe PID 3996 wrote to memory of 2024 3996 e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe"C:\Users\Admin\AppData\Local\Temp\e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop sharedaccess2⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess3⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe"C:\Users\Admin\AppData\Local\Temp\e0a4ef63cf6b5f38f684b7df4d7052c037707212e6c608086bc8d44f5768ac1e.exe"2⤵PID:2024