Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe
Resource
win10v2004-20220812-en
General
-
Target
3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe
-
Size
88KB
-
MD5
1aa47e32f7d8ebfa1b6eb620243659a0
-
SHA1
d8711c7738aef233f300e982814e9694ae4d83f7
-
SHA256
3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069
-
SHA512
9c5f208c582c00a346d8d4a3e64a21db19a84a8b0fff364ee980d0a8d13635bec17c9054a83e5691b414de959bf83c433cba8855be19533c2bd47c8ef6e3cc0f
-
SSDEEP
1536:dawyQ/8HqveEc39FElorg8/iwHdk6SzuAatLfts4V0dVnjy+OnnUEu+coucbu:qEA9oorg8/bHdk6SzuAatLfts4KVnjyf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1120 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1120 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3836 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3836 wrote to memory of 2084 3836 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe 79 PID 3836 wrote to memory of 2084 3836 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe 79 PID 3836 wrote to memory of 2084 3836 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe 79 PID 2084 wrote to memory of 1120 2084 cmd.exe 81 PID 2084 wrote to memory of 1120 2084 cmd.exe 81 PID 2084 wrote to memory of 1120 2084 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe"C:\Users\Admin\AppData\Local\Temp\3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 3eb6e4b6c6b240e84263d5960761c60a2b2⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-