Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
81ddb594b7d10967ce19248d3de15cb89b361f6b4e56cb8549ac74df7905c717.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
81ddb594b7d10967ce19248d3de15cb89b361f6b4e56cb8549ac74df7905c717.exe
Resource
win10v2004-20220812-en
General
-
Target
81ddb594b7d10967ce19248d3de15cb89b361f6b4e56cb8549ac74df7905c717.exe
-
Size
136KB
-
MD5
6e912e50c896ae4297a3bdee8eed3a38
-
SHA1
44dfd14c206512d8779d4da5abba9c4d3f14004e
-
SHA256
81ddb594b7d10967ce19248d3de15cb89b361f6b4e56cb8549ac74df7905c717
-
SHA512
5d27fe31c674f29cc643261ad361ebcfbf1c0657683d1a3d8d5f36e44a2080a935d6f6cc3c9437b1512f83afe4b96815eb0ba1b7701c2fc7ea91e3e7b5cf8c92
-
SSDEEP
3072:tShmzuS92gMdjac9S+dPFIpB3UASnsu+/5oIIym:tSh+aac4+dNIDRSsv/5Y
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 81ddb594b7d10967ce19248d3de15cb89b361f6b4e56cb8549ac74df7905c717.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 81ddb594b7d10967ce19248d3de15cb89b361f6b4e56cb8549ac74df7905c717.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 81ddb594b7d10967ce19248d3de15cb89b361f6b4e56cb8549ac74df7905c717.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4988 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4988 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2996 81ddb594b7d10967ce19248d3de15cb89b361f6b4e56cb8549ac74df7905c717.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2996 wrote to memory of 3468 2996 81ddb594b7d10967ce19248d3de15cb89b361f6b4e56cb8549ac74df7905c717.exe 79 PID 2996 wrote to memory of 3468 2996 81ddb594b7d10967ce19248d3de15cb89b361f6b4e56cb8549ac74df7905c717.exe 79 PID 2996 wrote to memory of 3468 2996 81ddb594b7d10967ce19248d3de15cb89b361f6b4e56cb8549ac74df7905c717.exe 79 PID 3468 wrote to memory of 4988 3468 cmd.exe 81 PID 3468 wrote to memory of 4988 3468 cmd.exe 81 PID 3468 wrote to memory of 4988 3468 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\81ddb594b7d10967ce19248d3de15cb89b361f6b4e56cb8549ac74df7905c717.exe"C:\Users\Admin\AppData\Local\Temp\81ddb594b7d10967ce19248d3de15cb89b361f6b4e56cb8549ac74df7905c717.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 81ddb594b7d10967ce19248d3de15cb89b2⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-