Analysis
-
max time kernel
184s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 18:52
Static task
static1
Behavioral task
behavioral1
Sample
0882182756180e269b4b4fbe9d6a9a76294fe82c4d78a2356c8ceea6c6d5325e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0882182756180e269b4b4fbe9d6a9a76294fe82c4d78a2356c8ceea6c6d5325e.exe
Resource
win10v2004-20221111-en
General
-
Target
0882182756180e269b4b4fbe9d6a9a76294fe82c4d78a2356c8ceea6c6d5325e.exe
-
Size
30KB
-
MD5
afc2d30a50cdc6c710e92aac09daf1eb
-
SHA1
6d5283fda926e5c0b9477ee7665eaf0b74fc9c09
-
SHA256
0882182756180e269b4b4fbe9d6a9a76294fe82c4d78a2356c8ceea6c6d5325e
-
SHA512
3c82e5dbb073ef7481f0b1ce5966661f8a7c8538e7d38be3c9505edc41fce3ad34ed30c9f29ff26c480d2b87c06c90d0e57dde9ff5ab3b4a673c643842893cd3
-
SSDEEP
384:Rx/s1q0xbI/nDTcmBH0FZcX7ckfwhNaBU5pArO1tFZIcqej9I1rj:Rx/s1qw+nDTjBH0jcXIAkE4mO1t70Pr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2408 stub.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\stub.exe 0882182756180e269b4b4fbe9d6a9a76294fe82c4d78a2356c8ceea6c6d5325e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 816 0882182756180e269b4b4fbe9d6a9a76294fe82c4d78a2356c8ceea6c6d5325e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 816 wrote to memory of 1628 816 0882182756180e269b4b4fbe9d6a9a76294fe82c4d78a2356c8ceea6c6d5325e.exe 82 PID 816 wrote to memory of 1628 816 0882182756180e269b4b4fbe9d6a9a76294fe82c4d78a2356c8ceea6c6d5325e.exe 82 PID 816 wrote to memory of 1628 816 0882182756180e269b4b4fbe9d6a9a76294fe82c4d78a2356c8ceea6c6d5325e.exe 82 PID 1628 wrote to memory of 2408 1628 rundll32.exe 83 PID 1628 wrote to memory of 2408 1628 rundll32.exe 83 PID 1628 wrote to memory of 2408 1628 rundll32.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\0882182756180e269b4b4fbe9d6a9a76294fe82c4d78a2356c8ceea6c6d5325e.exe"C:\Users\Admin\AppData\Local\Temp\0882182756180e269b4b4fbe9d6a9a76294fe82c4d78a2356c8ceea6c6d5325e.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe url.dll,FileProtocolHandler C:\Windows\stub.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\stub.exe"C:\Windows\stub.exe"3⤵
- Executes dropped EXE
PID:2408
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD582b52cd57a1e4dc8f1629161d54aab7f
SHA1a1a935e7e161bf0ed7bc2adbfcd4ef1620fe3c7d
SHA25647db1bdf0cfa449fd5428f3e0ad9f9b5e4fca81791f2c2fc931be17ded9b07b6
SHA512e796471f40270990debbb417c72b85e057b5a225fcb92cafd8d046f733e89c989a32f8a9e0328e193bae66488ddd3af819e3ee2ebdf0425ac1d6114516826523
-
Filesize
18KB
MD582b52cd57a1e4dc8f1629161d54aab7f
SHA1a1a935e7e161bf0ed7bc2adbfcd4ef1620fe3c7d
SHA25647db1bdf0cfa449fd5428f3e0ad9f9b5e4fca81791f2c2fc931be17ded9b07b6
SHA512e796471f40270990debbb417c72b85e057b5a225fcb92cafd8d046f733e89c989a32f8a9e0328e193bae66488ddd3af819e3ee2ebdf0425ac1d6114516826523