Analysis
-
max time kernel
202s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe
Resource
win10v2004-20221111-en
General
-
Target
12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe
-
Size
178KB
-
MD5
d4df43daed64639edb9d1eeb230b0830
-
SHA1
d1448cffd82acbb397d29464fec70e2a8dae506a
-
SHA256
12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b
-
SHA512
d5d3dbb75da6566925a4c3bd141e86b252c729aec1ba99f03670978adfbeb170eef0cb0f8570573196aaf878a58114dc4702dbd6ec26a5b8e402b2810d91253e
-
SSDEEP
3072:8VNyggjH8ElZlT5rud6tPWynmNC2mWhZJkbpD7ChfEjCDn8GIs+iUodbK:8VNyggjH8Ez15rFWyn72mwoWhfEjCb8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5076 Chrome.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1976 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3028 wrote to memory of 5076 3028 12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe 86 PID 3028 wrote to memory of 5076 3028 12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe 86 PID 3028 wrote to memory of 5076 3028 12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe 86 PID 5076 wrote to memory of 1976 5076 Chrome.exe 87 PID 5076 wrote to memory of 1976 5076 Chrome.exe 87 PID 5076 wrote to memory of 1976 5076 Chrome.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe"C:\Users\Admin\AppData\Local\Temp\12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Chrome.exe"C:\Users\Admin\AppData\Local\Temp\Chrome.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Chrome.exe" "Chrome.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1976
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD5d4df43daed64639edb9d1eeb230b0830
SHA1d1448cffd82acbb397d29464fec70e2a8dae506a
SHA25612a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b
SHA512d5d3dbb75da6566925a4c3bd141e86b252c729aec1ba99f03670978adfbeb170eef0cb0f8570573196aaf878a58114dc4702dbd6ec26a5b8e402b2810d91253e
-
Filesize
178KB
MD5d4df43daed64639edb9d1eeb230b0830
SHA1d1448cffd82acbb397d29464fec70e2a8dae506a
SHA25612a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b
SHA512d5d3dbb75da6566925a4c3bd141e86b252c729aec1ba99f03670978adfbeb170eef0cb0f8570573196aaf878a58114dc4702dbd6ec26a5b8e402b2810d91253e