Analysis
-
max time kernel
153s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
b59be91aaabb70000084dd7543509b1aedaa24fb8f9db4c1f0586f871975d189.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b59be91aaabb70000084dd7543509b1aedaa24fb8f9db4c1f0586f871975d189.exe
Resource
win10v2004-20220812-en
General
-
Target
b59be91aaabb70000084dd7543509b1aedaa24fb8f9db4c1f0586f871975d189.exe
-
Size
64KB
-
MD5
546fc496f971b732d4fe719826953ecb
-
SHA1
67d2bf6751dc6b616192cae511e885c2dd879cab
-
SHA256
b59be91aaabb70000084dd7543509b1aedaa24fb8f9db4c1f0586f871975d189
-
SHA512
2090d8d94ac65978a877e80577e897fa81313b1a3253c117063f094df64cf894bf5e7704dfe531c109ac07f4ac5d2a621e70c7984225465ae4fc2d34c497cee9
-
SSDEEP
1536:xET64WKch3dQzOwtwSI3yHBUJu5OXIvzpjIp/L:xq64Wx3dmqSSyHBknGzpjA/L
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b59be91aaabb70000084dd7543509b1aedaa24fb8f9db4c1f0586f871975d189.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3524 wrote to memory of 3592 3524 b59be91aaabb70000084dd7543509b1aedaa24fb8f9db4c1f0586f871975d189.exe 79 PID 3524 wrote to memory of 3592 3524 b59be91aaabb70000084dd7543509b1aedaa24fb8f9db4c1f0586f871975d189.exe 79 PID 3524 wrote to memory of 3592 3524 b59be91aaabb70000084dd7543509b1aedaa24fb8f9db4c1f0586f871975d189.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\b59be91aaabb70000084dd7543509b1aedaa24fb8f9db4c1f0586f871975d189.exe"C:\Users\Admin\AppData\Local\Temp\b59be91aaabb70000084dd7543509b1aedaa24fb8f9db4c1f0586f871975d189.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Nbj..bat" > nul 2> nul2⤵PID:3592
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5e3f087be3babdb4f6b3fecca11297f00
SHA11f68a22bf2e5a04df668b8f7451e64fe7579e8a8
SHA256e675a083714c94426edcba52174999fcd605f1cf25e5dfbb93c9f6763b3f0ad6
SHA5122a9112f230f6c918ab7ae3a775a7d6dd25bf881afe125b4b7a9630fe171cdf1d4db851c150ff29b0122f237a8abc6ea6dc638d1ae39a554dec896fe15814ac66