Analysis
-
max time kernel
234s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe
Resource
win10v2004-20220812-en
General
-
Target
7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe
-
Size
7KB
-
MD5
050771756ad083aa8ab86deb6dea78a4
-
SHA1
0e2c8d2a1b2f9006909c3900e9d7f46dfe038fda
-
SHA256
7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e
-
SHA512
a7dd7706880400fd4289843476f725fc2aa310b0cb499276f3156332c6deab1e071d1a5680f241a24cf4220916748469211496585d4051517c7bcdb0dd2eeead
-
SSDEEP
96:pnyFk7yW3tT+lPb3T3HFxphq7W/aVW9l3uWaDLeBomj++g:4Fk7yW9TWb3TVxpk7Wy8aDLI/++g
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Control Panel\International\Geo\Nation 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 5 IoCs
Uses commandline utility to view network configuration.
pid Process 1264 ipconfig.exe 1768 ipconfig.exe 1352 ipconfig.exe 1564 ipconfig.exe 1480 ipconfig.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Control Panel\International\Geo 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Control Panel\International 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 628 wrote to memory of 1480 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 28 PID 628 wrote to memory of 1480 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 28 PID 628 wrote to memory of 1480 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 28 PID 628 wrote to memory of 1480 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 28 PID 628 wrote to memory of 1264 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 29 PID 628 wrote to memory of 1264 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 29 PID 628 wrote to memory of 1264 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 29 PID 628 wrote to memory of 1264 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 29 PID 628 wrote to memory of 1768 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 31 PID 628 wrote to memory of 1768 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 31 PID 628 wrote to memory of 1768 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 31 PID 628 wrote to memory of 1768 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 31 PID 628 wrote to memory of 1352 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 33 PID 628 wrote to memory of 1352 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 33 PID 628 wrote to memory of 1352 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 33 PID 628 wrote to memory of 1352 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 33 PID 628 wrote to memory of 1564 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 34 PID 628 wrote to memory of 1564 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 34 PID 628 wrote to memory of 1564 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 34 PID 628 wrote to memory of 1564 628 7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe"C:\Users\Admin\AppData\Local\Temp\7400ee6ab57ae571f6088248db88c4e92e1f05fa8dd75204f59b33b66b1e1c5e.exe"1⤵
- Checks computer location settings
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /flushdns2⤵
- Gathers network information
PID:1480
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /registerdns2⤵
- Gathers network information
PID:1264
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /dnsflush2⤵
- Gathers network information
PID:1768
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /renew2⤵
- Gathers network information
PID:1352
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /renew_all2⤵
- Gathers network information
PID:1564
-