Analysis
-
max time kernel
175s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe
Resource
win10v2004-20220812-en
General
-
Target
c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe
-
Size
1.5MB
-
MD5
51b240bea2c3373fc025f874a9fad9d6
-
SHA1
10f03f4dc5fabe0a3170bcea06bb4826ef3cab37
-
SHA256
c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de
-
SHA512
dd3ed815a422b150659b07faae4da0dd4cc1959d0bdd888a3e13058bde55d9d4fbf26cfcf5f63bc965e987c62f6234a7dcf3d64ebb45f50b56da8f460450e0ba
-
SSDEEP
24576:npa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eGG:QcZC35VcOcmDcc6CdA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3812 set thread context of 292 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4900 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 292 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 292 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 292 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 292 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 292 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3812 wrote to memory of 504 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 79 PID 3812 wrote to memory of 504 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 79 PID 3812 wrote to memory of 504 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 79 PID 3812 wrote to memory of 292 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 81 PID 3812 wrote to memory of 292 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 81 PID 3812 wrote to memory of 292 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 81 PID 3812 wrote to memory of 292 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 81 PID 3812 wrote to memory of 292 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 81 PID 3812 wrote to memory of 292 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 81 PID 3812 wrote to memory of 292 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 81 PID 3812 wrote to memory of 292 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 81 PID 3812 wrote to memory of 292 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 81 PID 3812 wrote to memory of 292 3812 c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe 81 PID 504 wrote to memory of 4900 504 cmd.exe 82 PID 504 wrote to memory of 4900 504 cmd.exe 82 PID 504 wrote to memory of 4900 504 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe"C:\Users\Admin\AppData\Local\Temp\c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:4900
-
-
-
C:\Users\Admin\AppData\Local\Temp\c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe"C:\Users\Admin\AppData\Local\Temp\c8adefb190188d65e6034ee25bed6b45201455ce4d428052c9cdc148a94073de.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:292
-