Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 22:57
Static task
static1
Behavioral task
behavioral1
Sample
a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe
Resource
win10v2004-20220812-en
General
-
Target
a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe
-
Size
92KB
-
MD5
744e56d37738616d7154b92147c693d3
-
SHA1
044209f30308843d7cc198fb678ff544d4b0e9d8
-
SHA256
a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895
-
SHA512
0d698b5cb69113d2a4206c2fd17a3c29dc196df9ca50a3a608915aa6d2758a7412e940db3906422259da8fdffedbe8c92df1bd86763df70a99568c6de5cc518a
-
SSDEEP
768:4mp1D5+8+yyCExggbX4xyhKpDq3y2qimSr4CsDqel30JbP6XTI3WoUUZ+IcnR7S:4CD5ePN4xye0C3tDj8r6XEJTc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 604 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 604 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 376 a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe 376 a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 376 wrote to memory of 4364 376 a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe 82 PID 376 wrote to memory of 4364 376 a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe 82 PID 376 wrote to memory of 4364 376 a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe 82 PID 4364 wrote to memory of 604 4364 cmd.exe 84 PID 4364 wrote to memory of 604 4364 cmd.exe 84 PID 4364 wrote to memory of 604 4364 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe"C:\Users\Admin\AppData\Local\Temp\a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del a90eeb3d8224df965bc40d04773937fed62⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:604
-
-