Analysis
-
max time kernel
138s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2022, 14:11
Behavioral task
behavioral1
Sample
74b5caa560f8857431df58a21b85880e07c2e06d84fbb3a327c1add7e6b21495.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
74b5caa560f8857431df58a21b85880e07c2e06d84fbb3a327c1add7e6b21495.exe
Resource
win10v2004-20220812-en
General
-
Target
74b5caa560f8857431df58a21b85880e07c2e06d84fbb3a327c1add7e6b21495.exe
-
Size
1000KB
-
MD5
1b70124415d1c3b32bbc9fa082c6943c
-
SHA1
46d20d3184f7140fb80a78fc0368d7c1d2b1e78a
-
SHA256
74b5caa560f8857431df58a21b85880e07c2e06d84fbb3a327c1add7e6b21495
-
SHA512
73ac06f95e36200b1b0153b278afe0cdb9b12497e57f166a9277187ab1542cf0d88d93c479862857fe0bf7504dbebb1067c947e806749d1b641559111e5978c7
-
SSDEEP
12288:UIu9pb7QlUDrNMc3a46A9jmP/uhu/yMS08CkntxYRv:HuDbaurNtFfmP/UDMS08Ckn3q
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4008 mspaint.exe 4008 mspaint.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4600 74b5caa560f8857431df58a21b85880e07c2e06d84fbb3a327c1add7e6b21495.exe 4600 74b5caa560f8857431df58a21b85880e07c2e06d84fbb3a327c1add7e6b21495.exe 4600 74b5caa560f8857431df58a21b85880e07c2e06d84fbb3a327c1add7e6b21495.exe 4008 mspaint.exe 4008 mspaint.exe 4008 mspaint.exe 4008 mspaint.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4600 wrote to memory of 3276 4600 74b5caa560f8857431df58a21b85880e07c2e06d84fbb3a327c1add7e6b21495.exe 81 PID 4600 wrote to memory of 3276 4600 74b5caa560f8857431df58a21b85880e07c2e06d84fbb3a327c1add7e6b21495.exe 81 PID 4600 wrote to memory of 3276 4600 74b5caa560f8857431df58a21b85880e07c2e06d84fbb3a327c1add7e6b21495.exe 81 PID 3276 wrote to memory of 4008 3276 cmd.exe 83 PID 3276 wrote to memory of 4008 3276 cmd.exe 83 PID 3276 wrote to memory of 4008 3276 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\74b5caa560f8857431df58a21b85880e07c2e06d84fbb3a327c1add7e6b21495.exe"C:\Users\Admin\AppData\Local\Temp\74b5caa560f8857431df58a21b85880e07c2e06d84fbb3a327c1add7e6b21495.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\Receipt.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\Receipt.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4008
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4672