Analysis
-
max time kernel
172s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe
Resource
win10v2004-20220812-en
General
-
Target
7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe
-
Size
383KB
-
MD5
1eb752dcbc0e63ce7552c3d1e5145162
-
SHA1
19fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
-
SHA256
7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
-
SHA512
c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137
-
SSDEEP
6144:fxQiSTSvLmEo8NalPlNYEKjW9jf+SSMRlJ888888888888W88888888888:ZST03U1ZKsjfbSMt888888888888W88c
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5032 adbffeeda.exe 4964 bdfcfead.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\adbffeeda = "C:\\Users\\Admin\\AppData\\Roaming\\adbffeeda.exe" adbffeeda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\adbffeeda = "C:\\Users\\Admin\\AppData\\Roaming\\adbffeeda.exe" bdfcfead.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bdfcfead = "C:\\Users\\Admin\\AppData\\Roaming\\bdfcfead.exe" bdfcfead.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run adbffeeda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\adbffeeda = "C:\\Users\\Admin\\AppData\\Roaming\\adbffeeda.exe" 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bdfcfead = "C:\\Users\\Admin\\AppData\\Roaming\\bdfcfead.exe" 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bdfcfead = "C:\\Users\\Admin\\AppData\\Roaming\\bdfcfead.exe" adbffeeda.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run bdfcfead.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe 4964 bdfcfead.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5056 wrote to memory of 5032 5056 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 83 PID 5056 wrote to memory of 5032 5056 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 83 PID 5056 wrote to memory of 5032 5056 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 83 PID 5056 wrote to memory of 4964 5056 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 82 PID 5056 wrote to memory of 4964 5056 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 82 PID 5056 wrote to memory of 4964 5056 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe"C:\Users\Admin\AppData\Local\Temp\7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Roaming\bdfcfead.exe"C:\Users\Admin\AppData\Roaming\bdfcfead.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Users\Admin\AppData\Roaming\adbffeeda.exe"C:\Users\Admin\AppData\Roaming\adbffeeda.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD51eb752dcbc0e63ce7552c3d1e5145162
SHA119fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
SHA2567c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
SHA512c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137
-
Filesize
383KB
MD51eb752dcbc0e63ce7552c3d1e5145162
SHA119fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
SHA2567c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
SHA512c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137
-
Filesize
383KB
MD51eb752dcbc0e63ce7552c3d1e5145162
SHA119fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
SHA2567c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
SHA512c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137
-
Filesize
383KB
MD51eb752dcbc0e63ce7552c3d1e5145162
SHA119fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
SHA2567c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
SHA512c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137