Analysis
-
max time kernel
178s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe
Resource
win10v2004-20220812-en
General
-
Target
7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe
-
Size
124KB
-
MD5
e9d7a795203bfd970d41ebe2fa0c349d
-
SHA1
6226dec7b14e6e73d249e74604a4d83c4000c8f4
-
SHA256
7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d
-
SHA512
cf1588c7e0dedbf06c4106446b4654aab90d7ba7e67f3e2b7078ac20524eb119fb9a948252fd84799018c9362e8b257d1cef21963c2b33ea3e5a62d6c08c1236
-
SSDEEP
3072:cyl1eDqcgO5q6VE5Dgij5IyEKoKdBgYOP/TqHueMsuf:cylDE5bXIdHoK5ITqHueC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 444 set thread context of 4336 444 7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe 79 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 444 wrote to memory of 4336 444 7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe 79 PID 444 wrote to memory of 4336 444 7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe 79 PID 444 wrote to memory of 4336 444 7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe 79 PID 444 wrote to memory of 4336 444 7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe 79 PID 444 wrote to memory of 4336 444 7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe 79 PID 444 wrote to memory of 4336 444 7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe 79 PID 444 wrote to memory of 4336 444 7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe 79 PID 444 wrote to memory of 4336 444 7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe 79 PID 444 wrote to memory of 4336 444 7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe 79 PID 4336 wrote to memory of 2820 4336 7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe 80 PID 4336 wrote to memory of 2820 4336 7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe"C:\Users\Admin\AppData\Local\Temp\7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe"C:\Users\Admin\AppData\Local\Temp\7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\notepad.exe"C:\Windows\notepad.exe"3⤵PID:2820
-
-