Analysis
-
max time kernel
190s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
57e7feed0b995b78e53cb3a21894933575d52c74d3667b9958ad21faed9c6cb7.exe
Resource
win10v2004-20221111-en
General
-
Target
57e7feed0b995b78e53cb3a21894933575d52c74d3667b9958ad21faed9c6cb7.exe
-
Size
1.4MB
-
MD5
429f0ddfc34ee1dab008658592fa4622
-
SHA1
058fadd0730fcf0f860ee17365e2025d1f4823bc
-
SHA256
57e7feed0b995b78e53cb3a21894933575d52c74d3667b9958ad21faed9c6cb7
-
SHA512
bb060803a8edad4a3b4c3867859b17c6dbd7b727db8822c9a91bd15d2793a14ebbf92aca7fbe758fb80a9b8ae724252048ade995fc6c9e45a67a4bfeb6143ea8
-
SSDEEP
24576:VJr8tEZgHqeE0LOrcwehTsk9bq54RWLOtbTkYyms3xzuBNs1P3Hzh348DDCFW3f6:VJ4oePIcwCm54R95kYyR3xzT1PTt5HBi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 57e7feed0b995b78e53cb3a21894933575d52c74d3667b9958ad21faed9c6cb7.exe -
Loads dropped DLL 2 IoCs
pid Process 4308 rundll32.exe 4308 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings 57e7feed0b995b78e53cb3a21894933575d52c74d3667b9958ad21faed9c6cb7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4284 wrote to memory of 3664 4284 57e7feed0b995b78e53cb3a21894933575d52c74d3667b9958ad21faed9c6cb7.exe 85 PID 4284 wrote to memory of 3664 4284 57e7feed0b995b78e53cb3a21894933575d52c74d3667b9958ad21faed9c6cb7.exe 85 PID 4284 wrote to memory of 3664 4284 57e7feed0b995b78e53cb3a21894933575d52c74d3667b9958ad21faed9c6cb7.exe 85 PID 3664 wrote to memory of 4308 3664 control.exe 87 PID 3664 wrote to memory of 4308 3664 control.exe 87 PID 3664 wrote to memory of 4308 3664 control.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\57e7feed0b995b78e53cb3a21894933575d52c74d3667b9958ad21faed9c6cb7.exe"C:\Users\Admin\AppData\Local\Temp\57e7feed0b995b78e53cb3a21894933575d52c74d3667b9958ad21faed9c6cb7.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\qCOd~G.cPl",2⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\qCOd~G.cPl",3⤵
- Loads dropped DLL
PID:4308
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5b5f971bad20d89004a9f8f81d961c713
SHA14c55351ebbb35ade8a970af910c8c895ddceaf3a
SHA256c3e699583e2ebd443ff453d5f558990375178f94583f72d73dba254553a8ecda
SHA5126ede71350a39402b4847570c2011db8c694f7439e52515c38cd53a8461f7e822a06644a1e2a25fece47674c08bdc40e8bce38c7e5f95c48012410bab7e4f7749
-
Filesize
2.2MB
MD5b5f971bad20d89004a9f8f81d961c713
SHA14c55351ebbb35ade8a970af910c8c895ddceaf3a
SHA256c3e699583e2ebd443ff453d5f558990375178f94583f72d73dba254553a8ecda
SHA5126ede71350a39402b4847570c2011db8c694f7439e52515c38cd53a8461f7e822a06644a1e2a25fece47674c08bdc40e8bce38c7e5f95c48012410bab7e4f7749
-
Filesize
2.2MB
MD5b5f971bad20d89004a9f8f81d961c713
SHA14c55351ebbb35ade8a970af910c8c895ddceaf3a
SHA256c3e699583e2ebd443ff453d5f558990375178f94583f72d73dba254553a8ecda
SHA5126ede71350a39402b4847570c2011db8c694f7439e52515c38cd53a8461f7e822a06644a1e2a25fece47674c08bdc40e8bce38c7e5f95c48012410bab7e4f7749