Analysis
-
max time kernel
184s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 15:39
Static task
static1
Behavioral task
behavioral1
Sample
8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe
Resource
win10v2004-20221111-en
General
-
Target
8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe
-
Size
168KB
-
MD5
8e4be2eb83b42225b500ca568d023e9a
-
SHA1
8ea1f7cd198e9d6c6567444fffd1f0af0f1753f3
-
SHA256
8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d
-
SHA512
c809d76695b8aad93e6785af453d13ae8ad6f19af175efd134685538c41cab069c8b92ee1b3a210fe31efea067639e68f1a925527cdbd4fedfdb1069eb33c2b3
-
SSDEEP
3072:5v9cbTFhDHGrwpfwtTsZVQ3zY54tyeh8ZtkEqXJzRzaLrt:5Fcbhhb3p8TAQ3zY54tpqZtkEqZc
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2404 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exepid process 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exenet.exenet.execmd.execmd.exenet.exedescription pid process target process PID 3500 wrote to memory of 4260 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe net.exe PID 3500 wrote to memory of 4260 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe net.exe PID 3500 wrote to memory of 4260 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe net.exe PID 4260 wrote to memory of 4928 4260 net.exe net1.exe PID 4260 wrote to memory of 4928 4260 net.exe net1.exe PID 4260 wrote to memory of 4928 4260 net.exe net1.exe PID 3500 wrote to memory of 316 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe net.exe PID 3500 wrote to memory of 316 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe net.exe PID 3500 wrote to memory of 316 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe net.exe PID 316 wrote to memory of 976 316 net.exe net1.exe PID 316 wrote to memory of 976 316 net.exe net1.exe PID 316 wrote to memory of 976 316 net.exe net1.exe PID 3500 wrote to memory of 3476 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe cmd.exe PID 3500 wrote to memory of 3476 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe cmd.exe PID 3500 wrote to memory of 3476 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe cmd.exe PID 3500 wrote to memory of 2180 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe cmd.exe PID 3500 wrote to memory of 2180 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe cmd.exe PID 3500 wrote to memory of 2180 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe cmd.exe PID 3476 wrote to memory of 404 3476 cmd.exe net.exe PID 3476 wrote to memory of 404 3476 cmd.exe net.exe PID 3476 wrote to memory of 404 3476 cmd.exe net.exe PID 2180 wrote to memory of 2404 2180 cmd.exe sc.exe PID 2180 wrote to memory of 2404 2180 cmd.exe sc.exe PID 2180 wrote to memory of 2404 2180 cmd.exe sc.exe PID 404 wrote to memory of 4728 404 net.exe net1.exe PID 404 wrote to memory of 4728 404 net.exe net1.exe PID 404 wrote to memory of 4728 404 net.exe net1.exe PID 3500 wrote to memory of 2744 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe cmd.exe PID 3500 wrote to memory of 2744 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe cmd.exe PID 3500 wrote to memory of 2744 3500 8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe"C:\Users\Admin\AppData\Local\Temp\8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\net.exenet group /domain2⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 group /domain3⤵PID:4928
-
C:\Windows\SysWOW64\net.exenet group /domain2⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 group /domain3⤵PID:976
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C net.exe stop foundation2⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\net.exenet.exe stop foundation3⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop foundation4⤵PID:4728
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc delete foundation2⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\sc.exesc delete foundation3⤵
- Launches sc.exe
PID:2404 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\823571~1.EXE >> NUL2⤵PID:2744