Analysis
-
max time kernel
171s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe
Resource
win10v2004-20220812-en
General
-
Target
036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe
-
Size
1.5MB
-
MD5
59641eb858b51863dd62376d57c6199d
-
SHA1
2789f45bed5ca485254193805e3f220d601ed733
-
SHA256
036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd
-
SHA512
6749595e5bd0c3f28839f76276108d0e7ff8cf09f03e7167e792d68f8e4ea855e0212a0399775091751d2c54e4b2a2ee4e96c6a11054a35740b1877998ef6193
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eGf:wcZC35VcOcmDcc6Cdx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4356 set thread context of 4188 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 80 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4924 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4188 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 4188 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 4188 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 4188 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 4188 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4356 wrote to memory of 3328 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 78 PID 4356 wrote to memory of 3328 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 78 PID 4356 wrote to memory of 3328 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 78 PID 4356 wrote to memory of 4188 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 80 PID 4356 wrote to memory of 4188 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 80 PID 4356 wrote to memory of 4188 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 80 PID 4356 wrote to memory of 4188 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 80 PID 4356 wrote to memory of 4188 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 80 PID 4356 wrote to memory of 4188 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 80 PID 4356 wrote to memory of 4188 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 80 PID 4356 wrote to memory of 4188 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 80 PID 4356 wrote to memory of 4188 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 80 PID 4356 wrote to memory of 4188 4356 036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe 80 PID 3328 wrote to memory of 4924 3328 cmd.exe 81 PID 3328 wrote to memory of 4924 3328 cmd.exe 81 PID 3328 wrote to memory of 4924 3328 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe"C:\Users\Admin\AppData\Local\Temp\036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:4924
-
-
-
C:\Users\Admin\AppData\Local\Temp\036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe"C:\Users\Admin\AppData\Local\Temp\036b90a5949d5d3a89a4095e0393ffb111d365f07b84dd105509f6818b35fefd.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4188
-