Analysis
-
max time kernel
138s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe
Resource
win10v2004-20220812-en
General
-
Target
717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe
-
Size
1.5MB
-
MD5
f91c4e92d892e7f886ab7e42701a3426
-
SHA1
fd82d7112e6b69876a4d13fbda9c913435c9fb72
-
SHA256
717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311
-
SHA512
8e46ecf8c7369f33297116f634d71e4bfa8b88c1af4d72bc8040cb4c99a302e9819aa42a8be322d280021757ed09c1a1af884d0fecabcd97109e550626d00d48
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eGe:wcZC35VcOcmDcc6CdI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4636 set thread context of 5068 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3496 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 5068 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 5068 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 5068 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 5068 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 5068 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4740 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 80 PID 4636 wrote to memory of 4740 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 80 PID 4636 wrote to memory of 4740 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 80 PID 4636 wrote to memory of 5068 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 82 PID 4636 wrote to memory of 5068 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 82 PID 4636 wrote to memory of 5068 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 82 PID 4636 wrote to memory of 5068 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 82 PID 4636 wrote to memory of 5068 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 82 PID 4636 wrote to memory of 5068 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 82 PID 4636 wrote to memory of 5068 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 82 PID 4636 wrote to memory of 5068 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 82 PID 4636 wrote to memory of 5068 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 82 PID 4636 wrote to memory of 5068 4636 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 82 PID 4740 wrote to memory of 3496 4740 cmd.exe 83 PID 4740 wrote to memory of 3496 4740 cmd.exe 83 PID 4740 wrote to memory of 3496 4740 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe"C:\Users\Admin\AppData\Local\Temp\717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:3496
-
-
-
C:\Users\Admin\AppData\Local\Temp\717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe"C:\Users\Admin\AppData\Local\Temp\717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:5068
-