Analysis
-
max time kernel
154s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5.exe
Resource
win10v2004-20221111-en
General
-
Target
b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5.exe
-
Size
79KB
-
MD5
d1d12eed486f943fb15ea04da63be9e9
-
SHA1
b6b365a0f04bddeabe2cdb0879c76e972602f933
-
SHA256
b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5
-
SHA512
db7aae4cbe3b70c9e397b6b909f34e65bc58425d0dacc6264481155d48337329eaeebafc5df8b139ff5d4a1b0608b97f3236158bebb34f94af159588b31b771d
-
SSDEEP
1536:hKoYJ/VnGgXqkwk885iXMmX5zGpY8A24xk6p:MoyVGZD8IMm6J4xk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4412 wrote to memory of 396 4412 b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5.exe 83 PID 4412 wrote to memory of 396 4412 b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5.exe 83 PID 4412 wrote to memory of 396 4412 b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5.exe"C:\Users\Admin\AppData\Local\Temp\b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5.exe"1⤵
- Checks computer location settings
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Tqz..bat" > nul 2> nul2⤵PID:396
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD56f2a6a52f6d482410094a735671b8a58
SHA1526cb15ee7f6b090d8869e1c3d02894cb0a34c27
SHA2563d6f823f45099fd4b6c1aabe6c2c6de02c6dd35f18b449d6590d1e36d8c756b0
SHA512602736a7f1db164651e6ac2ee9ffe436814a6d9bc71de2ca349d2bfff781406671ba713581d9cf9838561b2a2ce592c9175a5e907e0d71f16c0d25a0dffe7a9e