Analysis
-
max time kernel
253s -
max time network
317s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
ceec662b5efd3d997aa7fa7e53b296eeaa42e275576f423b9320367f31866266.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ceec662b5efd3d997aa7fa7e53b296eeaa42e275576f423b9320367f31866266.exe
Resource
win10v2004-20221111-en
General
-
Target
ceec662b5efd3d997aa7fa7e53b296eeaa42e275576f423b9320367f31866266.exe
-
Size
111KB
-
MD5
a0a8b7dcc890213fbdba075f9fe5cd90
-
SHA1
894a333d5e633f0e2480d0c5ee490ba6d811d116
-
SHA256
ceec662b5efd3d997aa7fa7e53b296eeaa42e275576f423b9320367f31866266
-
SHA512
bade82227b174587c105c72844cdca9ace7d3d74b0851a84c92f95f3d1b0781d9b13c226b973aa06f81b260e9c979c3654d9094191e48e9db77353cb70333180
-
SSDEEP
3072:WwxVMhOC/dTDbq91+mno3t4QZQ3rAHfiJ:WTfFDbRnOTrA/a
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation ceec662b5efd3d997aa7fa7e53b296eeaa42e275576f423b9320367f31866266.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings ceec662b5efd3d997aa7fa7e53b296eeaa42e275576f423b9320367f31866266.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4140 wrote to memory of 896 4140 ceec662b5efd3d997aa7fa7e53b296eeaa42e275576f423b9320367f31866266.exe 81 PID 4140 wrote to memory of 896 4140 ceec662b5efd3d997aa7fa7e53b296eeaa42e275576f423b9320367f31866266.exe 81 PID 4140 wrote to memory of 896 4140 ceec662b5efd3d997aa7fa7e53b296eeaa42e275576f423b9320367f31866266.exe 81 PID 896 wrote to memory of 1584 896 WScript.exe 83 PID 896 wrote to memory of 1584 896 WScript.exe 83 PID 896 wrote to memory of 1584 896 WScript.exe 83 PID 1584 wrote to memory of 952 1584 cmd.exe 85 PID 1584 wrote to memory of 952 1584 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceec662b5efd3d997aa7fa7e53b296eeaa42e275576f423b9320367f31866266.exe"C:\Users\Admin\AppData\Local\Temp\ceec662b5efd3d997aa7fa7e53b296eeaa42e275576f423b9320367f31866266.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\7xdown.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C start /min iexplore http://447.cc/index2.html?7xdown3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://447.cc/index2.html?7xdown4⤵PID:952
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
334B
MD5ebecf7e7ab396f7d3befc5b1beaa1698
SHA1fc7504d29bafdbcf2057ce06fc1ac8d37b306071
SHA2560bbea4b97fa47f10fcaff80f1233850e2d077d0355d4dc0faa75690e8ef9d2de
SHA512a51fa5dcdff77340d0dfedc67b6e1ed467a57d1a96680d565acbd7f163dc5141a87f1df54ebc96340349f186bf2dbc600f7e4f5a96a95ee1df004be76a0e6901