Analysis
-
max time kernel
140s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
b68f2bb6241a1ba285e47b7a53b103634717ccffc99f9d3b669e493e7f429f28.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b68f2bb6241a1ba285e47b7a53b103634717ccffc99f9d3b669e493e7f429f28.exe
Resource
win10v2004-20221111-en
General
-
Target
b68f2bb6241a1ba285e47b7a53b103634717ccffc99f9d3b669e493e7f429f28.exe
-
Size
88KB
-
MD5
34ecab344500d4a4bbd0eb770aea9882
-
SHA1
2c7dccb582aa06bb6a743f78d21d3598ac8b4fb8
-
SHA256
b68f2bb6241a1ba285e47b7a53b103634717ccffc99f9d3b669e493e7f429f28
-
SHA512
f5894dbdf534e2e878e40023a6f280d0860ad82d9fadc04b19b084e5cac306761b9d2b1dab3b1fbf3acc19a170347e720f1b7fc736abd46d4935945d23040eb8
-
SSDEEP
1536:T+DvpuVSy3F2dXd+H6p5eQrkO93P18JOFrxCa:g3y3F2dXd9pEQrDNN8JOFrs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation b68f2bb6241a1ba285e47b7a53b103634717ccffc99f9d3b669e493e7f429f28.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b68f2bb6241a1ba285e47b7a53b103634717ccffc99f9d3b669e493e7f429f28.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b68f2bb6241a1ba285e47b7a53b103634717ccffc99f9d3b669e493e7f429f28.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2244 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2244 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2144 b68f2bb6241a1ba285e47b7a53b103634717ccffc99f9d3b669e493e7f429f28.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2144 wrote to memory of 3476 2144 b68f2bb6241a1ba285e47b7a53b103634717ccffc99f9d3b669e493e7f429f28.exe 85 PID 2144 wrote to memory of 3476 2144 b68f2bb6241a1ba285e47b7a53b103634717ccffc99f9d3b669e493e7f429f28.exe 85 PID 2144 wrote to memory of 3476 2144 b68f2bb6241a1ba285e47b7a53b103634717ccffc99f9d3b669e493e7f429f28.exe 85 PID 3476 wrote to memory of 2244 3476 cmd.exe 87 PID 3476 wrote to memory of 2244 3476 cmd.exe 87 PID 3476 wrote to memory of 2244 3476 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b68f2bb6241a1ba285e47b7a53b103634717ccffc99f9d3b669e493e7f429f28.exe"C:\Users\Admin\AppData\Local\Temp\b68f2bb6241a1ba285e47b7a53b103634717ccffc99f9d3b669e493e7f429f28.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del b68f2bb6241a1ba285e47b7a53b10363472⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-