Analysis
-
max time kernel
139s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 13:58
Behavioral task
behavioral1
Sample
b1ae6f0230fdbc46c99c0c8893f30cacbeac02b616fe50e58c29465fea4a11db.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b1ae6f0230fdbc46c99c0c8893f30cacbeac02b616fe50e58c29465fea4a11db.exe
Resource
win10v2004-20220812-en
General
-
Target
b1ae6f0230fdbc46c99c0c8893f30cacbeac02b616fe50e58c29465fea4a11db.exe
-
Size
50KB
-
MD5
51e13072c5e69e671fbf5abe06dcdd49
-
SHA1
0daf2ff53c9cdc502ff48563a7e242ff488bee47
-
SHA256
b1ae6f0230fdbc46c99c0c8893f30cacbeac02b616fe50e58c29465fea4a11db
-
SHA512
358d6dc3743d76a3cad26c3382ff54c347fade059f1e7898229c28e823599832aa20e51b257f1a982f11445a96445bd3b1ef587ecf2247ea5e015f94ea4c9258
-
SSDEEP
768:tscCv3YZRrk+igxXrbarQcREnbcuyD7Uhq9UHxHMzDDXyV0r:tscCvIZFkqxXrbwEnouy8hq9UKs0r
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2828-132-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b1ae6f0230fdbc46c99c0c8893f30cacbeac02b616fe50e58c29465fea4a11db.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: RenamesItself 4 IoCs
pid Process 5096 cmd.exe 5096 cmd.exe 5096 cmd.exe 5096 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2828 wrote to memory of 5096 2828 b1ae6f0230fdbc46c99c0c8893f30cacbeac02b616fe50e58c29465fea4a11db.exe 82 PID 2828 wrote to memory of 5096 2828 b1ae6f0230fdbc46c99c0c8893f30cacbeac02b616fe50e58c29465fea4a11db.exe 82 PID 2828 wrote to memory of 5096 2828 b1ae6f0230fdbc46c99c0c8893f30cacbeac02b616fe50e58c29465fea4a11db.exe 82 PID 5096 wrote to memory of 4168 5096 cmd.exe 85 PID 5096 wrote to memory of 4168 5096 cmd.exe 85 PID 5096 wrote to memory of 4168 5096 cmd.exe 85 PID 5096 wrote to memory of 4620 5096 cmd.exe 86 PID 5096 wrote to memory of 4620 5096 cmd.exe 86 PID 5096 wrote to memory of 4620 5096 cmd.exe 86 PID 5096 wrote to memory of 3492 5096 cmd.exe 87 PID 5096 wrote to memory of 3492 5096 cmd.exe 87 PID 5096 wrote to memory of 3492 5096 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1ae6f0230fdbc46c99c0c8893f30cacbeac02b616fe50e58c29465fea4a11db.exe"C:\Users\Admin\AppData\Local\Temp\b1ae6f0230fdbc46c99c0c8893f30cacbeac02b616fe50e58c29465fea4a11db.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DB61.tmp\¼ÓÃÜ°æKill.bat" "2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /ah /s/b3⤵PID:4168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir/s/b3⤵PID:4620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /s/b *.*3⤵PID:3492
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD524c051649a369a1e05d42a09cb35b147
SHA1ff910a515dcf4bb9d3a335ccb81a67a5c0a21438
SHA256e03ebf8120259c9b8d208ec3c58f3c6a53d8628c2400b9eb433890db1f17244c
SHA512fa38fbd6e44802229f9367621492031c97583636ee57bc5db61b10454ba9a4b8d8cb3db7cd95e3ce06a5a90c2398352dda1c9fa7f417d649fdc14e2eb4398835