Analysis
-
max time kernel
240s -
max time network
326s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 19:10
Static task
static1
Behavioral task
behavioral1
Sample
5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe
Resource
win10v2004-20221111-en
General
-
Target
5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe
-
Size
201KB
-
MD5
d844ce144ed2e61ffa31e18cd862b60f
-
SHA1
95ed5006bf6f24900bab497829791625d88b8912
-
SHA256
5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99
-
SHA512
21e46be9bff85172a788138579892aab05033e56591e7541cd7b92682058bf7bcaf2491cd4beff1b6e2026ddfeebd71fadd2629f21b98934252cb58a51004a5c
-
SSDEEP
3072:3uXG1BWNVI6vqC/0Q7cNyzu5LM7b1uI+1dqdukkvs1C8/ehoraNUXcQDL2Em:FWNNzuAMIGpvs1C8/ehoraNUXZDKEm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4496 PING.EXE 1856 PING.EXE 4008 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4860 wrote to memory of 1672 4860 5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe 82 PID 4860 wrote to memory of 1672 4860 5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe 82 PID 4860 wrote to memory of 1672 4860 5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe 82 PID 1672 wrote to memory of 4496 1672 cmd.exe 84 PID 1672 wrote to memory of 4496 1672 cmd.exe 84 PID 1672 wrote to memory of 4496 1672 cmd.exe 84 PID 1672 wrote to memory of 1856 1672 cmd.exe 85 PID 1672 wrote to memory of 1856 1672 cmd.exe 85 PID 1672 wrote to memory of 1856 1672 cmd.exe 85 PID 1672 wrote to memory of 4008 1672 cmd.exe 86 PID 1672 wrote to memory of 4008 1672 cmd.exe 86 PID 1672 wrote to memory of 4008 1672 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe"C:\Users\Admin\AppData\Local\Temp\5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8922.bat" "C:\Users\Admin\AppData\Local\Temp\5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:4496
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:1856
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:4008
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205B
MD5af942e21a17f04903c52cb28a9b89542
SHA1ebcfe47bad384564346db4141d26e3e68f9f984f
SHA256c62a90b84dac61f74122f6eaa01665155a18b28a68b799a963f8a877194f922d
SHA512790decec1485e8fc42c3ee09a3e871ee95fdf2bf2e5f15556de0a5b5db2106114d79206acf2dcf3e7c0dbe9df7b1298e0b3f7247a34d9d3bd9f296cc9b61211a