Analysis
-
max time kernel
184s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 10:45
Static task
static1
Behavioral task
behavioral1
Sample
7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe
Resource
win10v2004-20220812-en
General
-
Target
7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe
-
Size
1.5MB
-
MD5
bcd9ad539509ce53adc5c7f4e4c27e31
-
SHA1
8ae03669a2c149846e08159972791d2dd9f15b86
-
SHA256
7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf
-
SHA512
9d2754cdbaceb2656a79159924b20251c1c636e73350f107d88304ceb4a7aeff4ed9b3196052ea70e48066a569bd8fb92dae580650f847e6f8d9694ecc2c4043
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eGm:wcZC35VcOcmDcc6Cdw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1484 set thread context of 4884 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 908 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4884 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 4884 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 4884 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 4884 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 4884 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1484 wrote to memory of 4944 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 79 PID 1484 wrote to memory of 4944 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 79 PID 1484 wrote to memory of 4944 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 79 PID 1484 wrote to memory of 4884 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 81 PID 1484 wrote to memory of 4884 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 81 PID 1484 wrote to memory of 4884 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 81 PID 1484 wrote to memory of 4884 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 81 PID 1484 wrote to memory of 4884 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 81 PID 1484 wrote to memory of 4884 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 81 PID 1484 wrote to memory of 4884 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 81 PID 1484 wrote to memory of 4884 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 81 PID 1484 wrote to memory of 4884 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 81 PID 1484 wrote to memory of 4884 1484 7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe 81 PID 4944 wrote to memory of 908 4944 cmd.exe 82 PID 4944 wrote to memory of 908 4944 cmd.exe 82 PID 4944 wrote to memory of 908 4944 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe"C:\Users\Admin\AppData\Local\Temp\7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:908
-
-
-
C:\Users\Admin\AppData\Local\Temp\7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe"C:\Users\Admin\AppData\Local\Temp\7c585b06e75904877a4a9b73862b2d11255fe0df0e3d4982d2c43732c75fffbf.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4884
-