Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe
Resource
win10v2004-20220812-en
General
-
Target
ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe
-
Size
44KB
-
MD5
7c58a5a22a30066e491ab7b6b74b78f5
-
SHA1
70b99f9c27eef94f1e6625ec635538ac0b516b86
-
SHA256
ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349
-
SHA512
ce9f7ced6798756dbcd0775f3b56d043477bd3f95a02a345145478ee2cc7578e66856b47d77ac9725cae82d84bddee9843957122b0f58d57662136bfae2d3fe3
-
SSDEEP
768:exQ1JASI6IhLGzr3UQzTGfGgcc8wi8Fx+5t8dv0Cj:exF2IQVgRyct0Cj
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "0" ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 3656 taskkill.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "0" ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3656 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4984 wrote to memory of 1384 4984 ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe 81 PID 4984 wrote to memory of 1384 4984 ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe 81 PID 4984 wrote to memory of 1384 4984 ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe 81 PID 1384 wrote to memory of 3656 1384 cmd.exe 83 PID 1384 wrote to memory of 3656 1384 cmd.exe 83 PID 1384 wrote to memory of 3656 1384 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe"C:\Users\Admin\AppData\Local\Temp\ebf4b411dc5d29f406ce86c1a2f560b03d628582866ea59af0189a56d441d349.exe"1⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /F /IM ekrn.exe /T2⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ekrn.exe /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-