Analysis
-
max time kernel
202s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe
Resource
win10v2004-20221111-en
General
-
Target
fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe
-
Size
1.5MB
-
MD5
cb8d8874c16921af398bb52c67839973
-
SHA1
9271f5c7eeda4f91144c395f299f4f5fdc41d0bd
-
SHA256
fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765
-
SHA512
b5f93837c4cf0c3fa34c5b0c0a3fae98e1beaab0ab5408dec2eed8f348663bc06a551a56a2adfd5666dafc8d95c7ba5e24e118863ecf6a91b624f2fcfe15ebf5
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eG5:wcZC35VcOcmDcc6Cdb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3940 set thread context of 4912 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2232 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4912 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 4912 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 4912 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 4912 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 4912 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3940 wrote to memory of 5092 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 81 PID 3940 wrote to memory of 5092 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 81 PID 3940 wrote to memory of 5092 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 81 PID 3940 wrote to memory of 4912 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 83 PID 3940 wrote to memory of 4912 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 83 PID 3940 wrote to memory of 4912 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 83 PID 3940 wrote to memory of 4912 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 83 PID 3940 wrote to memory of 4912 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 83 PID 3940 wrote to memory of 4912 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 83 PID 3940 wrote to memory of 4912 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 83 PID 3940 wrote to memory of 4912 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 83 PID 3940 wrote to memory of 4912 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 83 PID 3940 wrote to memory of 4912 3940 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 83 PID 5092 wrote to memory of 2232 5092 cmd.exe 84 PID 5092 wrote to memory of 2232 5092 cmd.exe 84 PID 5092 wrote to memory of 2232 5092 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe"C:\Users\Admin\AppData\Local\Temp\fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:2232
-
-
-
C:\Users\Admin\AppData\Local\Temp\fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe"C:\Users\Admin\AppData\Local\Temp\fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4912
-