Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 05:02
Static task
static1
Behavioral task
behavioral1
Sample
46449317872b2a26ab61cd91e65b5b54503b6bd9a506cf8e4559f23069ed52c8.exe
Resource
win10v2004-20220812-en
General
-
Target
46449317872b2a26ab61cd91e65b5b54503b6bd9a506cf8e4559f23069ed52c8.exe
-
Size
2.1MB
-
MD5
a39b3bcef6c47615043ad856b01c4297
-
SHA1
0bf5b007b7371824fba6216060cde937ee7fcdff
-
SHA256
46449317872b2a26ab61cd91e65b5b54503b6bd9a506cf8e4559f23069ed52c8
-
SHA512
1a403aa645854a550cb243f90b45de9f14f5b7c6354ba11ee586a4dfdff7047a386d1c218f3afd3382729e9012c253fb1fd2f8c9c3a9c98f7500b8912559fbb3
-
SSDEEP
49152:CBDvA5WGskLBHgu8As7CfkOqK/pwOjw/ybBzmUpC+osZk:UNkR0gXpwOUKLVosq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 46449317872b2a26ab61cd91e65b5b54503b6bd9a506cf8e4559f23069ed52c8.exe -
Loads dropped DLL 1 IoCs
pid Process 1724 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 1724 4832 46449317872b2a26ab61cd91e65b5b54503b6bd9a506cf8e4559f23069ed52c8.exe 81 PID 4832 wrote to memory of 1724 4832 46449317872b2a26ab61cd91e65b5b54503b6bd9a506cf8e4559f23069ed52c8.exe 81 PID 4832 wrote to memory of 1724 4832 46449317872b2a26ab61cd91e65b5b54503b6bd9a506cf8e4559f23069ed52c8.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\46449317872b2a26ab61cd91e65b5b54503b6bd9a506cf8e4559f23069ed52c8.exe"C:\Users\Admin\AppData\Local\Temp\46449317872b2a26ab61cd91e65b5b54503b6bd9a506cf8e4559f23069ed52c8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /y .\RNXK9tH.H2⤵
- Loads dropped DLL
PID:1724
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5983fe419ead454df0ad3a46e3c371de4
SHA17c9f48aa51093e775f4c702c241714624b55d0cc
SHA25628525f904df18b93199dd36e170984ff9cf1f9037490915dee0b8e0a83f3ceca
SHA512dee48a0f0ff4c2ad2ae6fd9823920b6b6852a30c2e87598987ea9639923e630e78e122b7dd84afe06be6b9ab39dc3e13d4527d4085081e757879c68f4ccb75d9
-
Filesize
2.2MB
MD5983fe419ead454df0ad3a46e3c371de4
SHA17c9f48aa51093e775f4c702c241714624b55d0cc
SHA25628525f904df18b93199dd36e170984ff9cf1f9037490915dee0b8e0a83f3ceca
SHA512dee48a0f0ff4c2ad2ae6fd9823920b6b6852a30c2e87598987ea9639923e630e78e122b7dd84afe06be6b9ab39dc3e13d4527d4085081e757879c68f4ccb75d9