Analysis
-
max time kernel
189s -
max time network
200s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 18:18
Static task
static1
Behavioral task
behavioral1
Sample
47c2208fc6dc315b368d422346de2fdbfb3c50a2c3e82eabab43b681dc157bf4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
47c2208fc6dc315b368d422346de2fdbfb3c50a2c3e82eabab43b681dc157bf4.exe
Resource
win10v2004-20220812-en
General
-
Target
47c2208fc6dc315b368d422346de2fdbfb3c50a2c3e82eabab43b681dc157bf4.exe
-
Size
41KB
-
MD5
fb0ad150a82ce93d158fda65f8d03747
-
SHA1
531af1117eff12860f8d1ec431afaa84b000aae4
-
SHA256
47c2208fc6dc315b368d422346de2fdbfb3c50a2c3e82eabab43b681dc157bf4
-
SHA512
369acd0bb4978946bbb1c9e5ef68b796c98497b4dd8a68959be8f53f880e231a7298b5516f2d4793d47e7f15ab5b00346d84156237fa5290ffe28788680cbcf3
-
SSDEEP
768:soljZfbVwxsBAEeqropjgaan6MlKg0+os:solnIqNeqroClKgx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\International\Geo\Nation 47c2208fc6dc315b368d422346de2fdbfb3c50a2c3e82eabab43b681dc157bf4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1996 47c2208fc6dc315b368d422346de2fdbfb3c50a2c3e82eabab43b681dc157bf4.exe