Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 03:13
Static task
static1
Behavioral task
behavioral1
Sample
7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
Resource
win10v2004-20220812-en
General
-
Target
7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
-
Size
152KB
-
MD5
f432a89d4ba2e6aa2975335f3a57da1b
-
SHA1
815689ebd707d7e55fd35815958db05c923b590c
-
SHA256
7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a
-
SHA512
c7dba55980d6a3ee5871ec9a50227f7e92e8f2bd4a74d25d15ae76f0110f437ac215fe3ec25921b6f2b0167ca044d5a35835477756c2dae86344b32844a81905
-
SSDEEP
3072:yIl0QiGEomaClFmwbcDRMjEBZ4v9xDx71yHVJA/ndH5:uJG2rv3cGBvHV7Wknd
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe -
Loads dropped DLL 5 IoCs
pid Process 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5048 WerFault.exe 2288 WerFault.exe 2324 WerFault.exe 2356 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2288 5036 WerFault.exe 78 2356 5036 WerFault.exe 78 -
Runs .reg file with regedit 1 IoCs
pid Process 3436 regedit.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5036 wrote to memory of 1984 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 79 PID 5036 wrote to memory of 1984 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 79 PID 5036 wrote to memory of 1984 5036 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 79 PID 1984 wrote to memory of 3436 1984 regedt32.exe 81 PID 1984 wrote to memory of 3436 1984 regedt32.exe 81 PID 1984 wrote to memory of 3436 1984 regedt32.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe"C:\Users\Admin\AppData\Local\Temp\7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\regedt32.exe"C:\Windows\System32\regedt32.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"3⤵
- Runs .reg file with regedit
PID:3436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 10122⤵
- Loads dropped DLL
- Program crash
PID:2288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 9842⤵
- Loads dropped DLL
- Program crash
PID:2356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 5036 -ip 50361⤵
- Loads dropped DLL
PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 5036 -ip 50361⤵
- Loads dropped DLL
PID:2324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217B
MD5d8841f7d471efa7e3b960da51ece135f
SHA14b128b589f7f49df4585177d2d2a37356241a0d3
SHA256d411b8fce61ef781402f1e177d3ddef3ba10e9fe7d5b29c0d7f33948ac8655be
SHA51225005451f606d92005baa5604bbced7ee068ea337ba41b3c3bb85fbe6ced6d80becc2ebaa8abfd9012a36d5b00cfc4dd5b89dd10318beaa21a9ea312f4035d56
-
Filesize
41KB
MD53fd996d73950eeb6edfa0a2f6589fd89
SHA13c998a95ff61cf2054c0b155d2a09cf7002d1779
SHA25618a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb
SHA5129e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1
-
Filesize
41KB
MD53fd996d73950eeb6edfa0a2f6589fd89
SHA13c998a95ff61cf2054c0b155d2a09cf7002d1779
SHA25618a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb
SHA5129e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1
-
Filesize
41KB
MD53fd996d73950eeb6edfa0a2f6589fd89
SHA13c998a95ff61cf2054c0b155d2a09cf7002d1779
SHA25618a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb
SHA5129e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1
-
Filesize
41KB
MD53fd996d73950eeb6edfa0a2f6589fd89
SHA13c998a95ff61cf2054c0b155d2a09cf7002d1779
SHA25618a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb
SHA5129e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1
-
Filesize
41KB
MD53fd996d73950eeb6edfa0a2f6589fd89
SHA13c998a95ff61cf2054c0b155d2a09cf7002d1779
SHA25618a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb
SHA5129e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1