Analysis
-
max time kernel
153s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 11:31
Static task
static1
Behavioral task
behavioral1
Sample
3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe
Resource
win10v2004-20221111-en
General
-
Target
3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe
-
Size
2.0MB
-
MD5
56210dd82506f4ed55835af8c6ddc0e0
-
SHA1
cb8f8d51d903589d80ea523f88f4ba02a1e779da
-
SHA256
3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e
-
SHA512
7c209b50669b8e8aaaf3fd58db361f67dad1831c027e62a8412fcfc7208babcb3f10922344a661edd278e76567dfccdbfd86f42bc6456100b59ae6cc047ad59a
-
SSDEEP
24576:B2KrlpxUxHoFhp/S1AWmQO18C2BwfTs6T22CKRJqNE4u6FOcnDsHspz8vlX9xRBW:BTDxB8CWwfTX3clnBowjmE
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exedescription ioc process File opened (read-only) \??\R: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\U: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\V: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\Y: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\E: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\K: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\Q: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\O: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\P: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\W: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\X: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\Z: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\H: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\I: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\M: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\F: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\J: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\L: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\T: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\G: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\N: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe File opened (read-only) \??\S: 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBIOSDate 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exepid process 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
tcpsvcs.exepid process 3776 tcpsvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
tcpsvcs.exepid process 3776 tcpsvcs.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.execmd.exenet.execmd.exenet.exedescription pid process target process PID 4504 wrote to memory of 4520 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe cmd.exe PID 4504 wrote to memory of 4520 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe cmd.exe PID 4504 wrote to memory of 4520 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe cmd.exe PID 4520 wrote to memory of 3812 4520 cmd.exe net.exe PID 4520 wrote to memory of 3812 4520 cmd.exe net.exe PID 4520 wrote to memory of 3812 4520 cmd.exe net.exe PID 3812 wrote to memory of 2080 3812 net.exe net1.exe PID 3812 wrote to memory of 2080 3812 net.exe net1.exe PID 3812 wrote to memory of 2080 3812 net.exe net1.exe PID 4504 wrote to memory of 3776 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe tcpsvcs.exe PID 4504 wrote to memory of 3776 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe tcpsvcs.exe PID 4504 wrote to memory of 3776 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe tcpsvcs.exe PID 4504 wrote to memory of 3776 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe tcpsvcs.exe PID 4504 wrote to memory of 3776 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe tcpsvcs.exe PID 4504 wrote to memory of 3776 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe tcpsvcs.exe PID 4504 wrote to memory of 3776 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe tcpsvcs.exe PID 4504 wrote to memory of 3776 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe tcpsvcs.exe PID 4504 wrote to memory of 3776 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe tcpsvcs.exe PID 4504 wrote to memory of 3776 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe tcpsvcs.exe PID 4504 wrote to memory of 3776 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe tcpsvcs.exe PID 4504 wrote to memory of 3776 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe tcpsvcs.exe PID 4504 wrote to memory of 1808 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe cmd.exe PID 4504 wrote to memory of 1808 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe cmd.exe PID 4504 wrote to memory of 1808 4504 3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe cmd.exe PID 1808 wrote to memory of 3384 1808 cmd.exe net.exe PID 1808 wrote to memory of 3384 1808 cmd.exe net.exe PID 1808 wrote to memory of 3384 1808 cmd.exe net.exe PID 3384 wrote to memory of 1928 3384 net.exe net1.exe PID 3384 wrote to memory of 1928 3384 net.exe net1.exe PID 3384 wrote to memory of 1928 3384 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe"C:\Users\Admin\AppData\Local\Temp\3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Enumerates connected drives
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop Spooler2⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\net.exenet stop Spooler3⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Spooler4⤵PID:2080
-
C:\Windows\SysWOW64\tcpsvcs.exe"C:\Users\Admin\AppData\Local\Temp\3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e2.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:3776 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net start Spooler2⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\net.exenet start Spooler3⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Spooler4⤵PID:1928
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1860