Analysis
-
max time kernel
175s -
max time network
231s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 07:17
Static task
static1
Behavioral task
behavioral1
Sample
995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56.exe
Resource
win10v2004-20221111-en
General
-
Target
995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56.exe
-
Size
67KB
-
MD5
7c40425452502a673ec1055c35f08a9b
-
SHA1
d4b63bc3425fe8fefbd4a6cd36e5c12b7de40c39
-
SHA256
995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56
-
SHA512
bd98a9058b6b8ed839005b09e1e8379ecc669d50241545091ac67d49f13591ba29862bbbd5e85b108241d7db0af6e6308e5bbdee8cb4b6303c620b862e95220c
-
SSDEEP
1536:2wetP10SuUdZuhRfUwvw37j/XrTnEmgIFlkFVtJ/q:2vc0ZupIrj/XzD4d/q
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2360 995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2360 wrote to memory of 228 2360 995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56.exe 83 PID 2360 wrote to memory of 228 2360 995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56.exe 83 PID 2360 wrote to memory of 228 2360 995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56.exe"C:\Users\Admin\AppData\Local\Temp\995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56.exe"1⤵
- Checks computer location settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Qvb..bat" > nul 2> nul2⤵PID:228
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD58f613a5465230f2e53ffab0fcfc4e378
SHA1acc32618d9ac57186ba37bd969f5ae408bc3cee2
SHA2562ffe99aed8dd93f9d1e10dab71ecfb32752b1e897e273b9df01c7cf7525cceb8
SHA51222eab77710a5e638c02d0cdf16c6747bedfe05f6c977d3f6c15c26b9322bc5c428bd1c7e8b30977193f6d370172dcdfc2c05240056d57078cb20426a83881dbc