Analysis
-
max time kernel
239s -
max time network
262s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 07:45
Static task
static1
Behavioral task
behavioral1
Sample
Shipping documents.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Shipping documents.exe
Resource
win10v2004-20221111-en
General
-
Target
Shipping documents.exe
-
Size
960KB
-
MD5
a0b2a10e84abe8930570103f841bcc75
-
SHA1
441c100f5467f1e7983b3e62119b60bb3cc757d7
-
SHA256
ebb86221b5c4336e8155321c3ef818e39e38c981227b768433d107ba6aa3bd69
-
SHA512
023c0e59dbdd9dd8f3b2e3ad99154942d651e7b3c3b498e25d957fb4b717dde7148a932bc1cfd1a4a9679889fcaa22de8b25d75ae14f01e12c3a25ef248794d5
-
SSDEEP
24576:EGU376CRkFg/IyXtBbvShFasPKhCX0sTLZeD1zBCh:2PkoXvSLSkzTNk1W
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Shipping documents.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation Shipping documents.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Shipping documents.exedescription pid process target process PID 3496 wrote to memory of 1512 3496 Shipping documents.exe schtasks.exe PID 3496 wrote to memory of 1512 3496 Shipping documents.exe schtasks.exe PID 3496 wrote to memory of 1512 3496 Shipping documents.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping documents.exe"C:\Users\Admin\AppData\Local\Temp\Shipping documents.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iRqvNpf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp347F.tmp"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp347F.tmpFilesize
1KB
MD5221803d18d9362b2e1f2cb87cc9882eb
SHA160a1a5a88b94a0011cf81ebe628a238a495ed0ea
SHA256468e0000fc1ee8aecd9f71bdaef9b732451d1d17299bad6eebbc3ef725b84c4e
SHA512eb7bb7d5abd350d6a2c8050967295c243ca5f23ba35ce5d9ccad7aba0526398d209dcaa7e1a6427f7ba41ff62dc7287b0cf847a238647f6a1307ae26694f237b
-
memory/1512-137-0x0000000000000000-mapping.dmp
-
memory/3496-132-0x0000000000AC0000-0x0000000000BB6000-memory.dmpFilesize
984KB
-
memory/3496-133-0x0000000005B80000-0x0000000006124000-memory.dmpFilesize
5.6MB
-
memory/3496-134-0x00000000055D0000-0x0000000005662000-memory.dmpFilesize
584KB
-
memory/3496-135-0x0000000005710000-0x00000000057AC000-memory.dmpFilesize
624KB
-
memory/3496-136-0x0000000005670000-0x000000000567A000-memory.dmpFilesize
40KB