Analysis
-
max time kernel
274s -
max time network
359s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 15:37
Static task
static1
Behavioral task
behavioral1
Sample
49363f08a18524030e6c1ab7d036d251ec00624567f3c1a34599ec31760ea6e7.exe
Resource
win10v2004-20221111-en
General
-
Target
49363f08a18524030e6c1ab7d036d251ec00624567f3c1a34599ec31760ea6e7.exe
-
Size
1.9MB
-
MD5
2f50f0523060c46809128782cce3a38e
-
SHA1
0f0ce0288098d465123c8749ac51acce8dbf054f
-
SHA256
49363f08a18524030e6c1ab7d036d251ec00624567f3c1a34599ec31760ea6e7
-
SHA512
fafdaa82a9f30c23d616b66f50df6f23a6a5d7fb242016bb606190ec5bd55f40bc4713f7d17b73c4ce5bac4d6152058b9af73d890be5f77c41e05c9ce9bc086c
-
SSDEEP
49152:NsP/n+AVOIlKSX5iZmyklvHH8R8nqTfw7T2/bD4LWnhy3s03d98:u+GwUWm3RSia/P4LWhy3sMi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 49363f08a18524030e6c1ab7d036d251ec00624567f3c1a34599ec31760ea6e7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1352 wrote to memory of 3752 1352 49363f08a18524030e6c1ab7d036d251ec00624567f3c1a34599ec31760ea6e7.exe 84 PID 1352 wrote to memory of 3752 1352 49363f08a18524030e6c1ab7d036d251ec00624567f3c1a34599ec31760ea6e7.exe 84 PID 1352 wrote to memory of 3752 1352 49363f08a18524030e6c1ab7d036d251ec00624567f3c1a34599ec31760ea6e7.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\49363f08a18524030e6c1ab7d036d251ec00624567f3c1a34599ec31760ea6e7.exe"C:\Users\Admin\AppData\Local\Temp\49363f08a18524030e6c1ab7d036d251ec00624567f3c1a34599ec31760ea6e7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\MT5L8IfO.Cpl",2⤵PID:3752
-