Analysis
-
max time kernel
169s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c.exe
Resource
win10v2004-20220812-en
General
-
Target
a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c.exe
-
Size
113KB
-
MD5
8a1794df4ad921e999b3fa57e7d5f51e
-
SHA1
23fec1d678d160bd97d7c667eeb9294bf37bb58c
-
SHA256
a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c
-
SHA512
c492bcb366a527b5ef5578e57f2a078ae8b947f823964c555c3f640e84c456eafdf858296d55d5a6f30e54ff6eedb5749af6dfe6d25a1514479db7ab1ef1e4ed
-
SSDEEP
3072:aemcyqFcEJrRL5JbfHmTy6ol2M5bh85VN+umgLFIq:ai1Fz7mMkc18PNIgJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3676 wrote to memory of 2708 3676 a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c.exe 79 PID 3676 wrote to memory of 2708 3676 a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c.exe 79 PID 3676 wrote to memory of 2708 3676 a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c.exe"C:\Users\Admin\AppData\Local\Temp\a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Gzf..bat" > nul 2> nul2⤵PID:2708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5862d17506e4da4b4a7289d808a0852aa
SHA1a19d304860d446acff542efbb12dd8621754620f
SHA256ccc1cf4a778601cde9beedd726373b64ef966cf4e167398707f208c90ad2fc9f
SHA5123ad5d1628d0fdce9347e0ea881773701ae51b589da194481a43d2015891bed3020e4a8bc82ce768eed3af229cfa5dfe823a5982863da888672e1bf05e58251ec