Analysis
-
max time kernel
189s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 20:01
Behavioral task
behavioral1
Sample
f38dd5dc3f8589bc824e93993008aadaf7336dece1a39fad862efe63a45f403b.exe
Resource
win7-20221111-en
General
-
Target
f38dd5dc3f8589bc824e93993008aadaf7336dece1a39fad862efe63a45f403b.exe
-
Size
1.1MB
-
MD5
9241dccdbc643b83b848aaa3b7bf1edd
-
SHA1
2edf946d172d2305fdd270be21f3c769a2b74b56
-
SHA256
f38dd5dc3f8589bc824e93993008aadaf7336dece1a39fad862efe63a45f403b
-
SHA512
d7d1120da38a679c7f80fc084739f0378aa4046265befb13280dd1b456957d0b9282ed13effe482bce7af762440d83a9b68dd3bb6c9935ed98d4f6794f8c9750
-
SSDEEP
24576:lI4D+SK9c8wA2ChKnPxTl3Zqv9GWCUJIVJj5M:lIbWRYetl8VrI/j5M
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3628 b2e.exe 5008 batchfile.bat -
resource yara_rule behavioral2/memory/220-132-0x0000000000400000-0x000000000052F000-memory.dmp upx behavioral2/memory/220-136-0x0000000000400000-0x000000000052F000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation f38dd5dc3f8589bc824e93993008aadaf7336dece1a39fad862efe63a45f403b.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation b2e.exe -
resource yara_rule behavioral2/files/0x0008000000023153-138.dat themida behavioral2/files/0x0008000000023153-139.dat themida -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 220 wrote to memory of 3628 220 f38dd5dc3f8589bc824e93993008aadaf7336dece1a39fad862efe63a45f403b.exe 84 PID 220 wrote to memory of 3628 220 f38dd5dc3f8589bc824e93993008aadaf7336dece1a39fad862efe63a45f403b.exe 84 PID 220 wrote to memory of 3628 220 f38dd5dc3f8589bc824e93993008aadaf7336dece1a39fad862efe63a45f403b.exe 84 PID 3628 wrote to memory of 5008 3628 b2e.exe 85 PID 3628 wrote to memory of 5008 3628 b2e.exe 85 PID 3628 wrote to memory of 5008 3628 b2e.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f38dd5dc3f8589bc824e93993008aadaf7336dece1a39fad862efe63a45f403b.exe"C:\Users\Admin\AppData\Local\Temp\f38dd5dc3f8589bc824e93993008aadaf7336dece1a39fad862efe63a45f403b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\24CE.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\24CE.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\24CE.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\f38dd5dc3f8589bc824e93993008aadaf7336dece1a39fad862efe63a45f403b.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\3095.tmp\batchfile.bat"C:\Users\Admin\AppData\Local\Temp\3095.tmp\batchfile.bat"3⤵
- Executes dropped EXE
PID:5008
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5da8cef5afbaa5a291b56ccbe8f3a5502
SHA13a1e55dc4327917f8368d132240fb9e2544d9694
SHA256cb1df0d7eafa58fdb852f8616edf8ef46c1897df9dcf6bfe7b60b23f5d7bc864
SHA512ee2aa7189b7b4801dce66ce37d10f6d91d7aac2b9aea4cbb1455a9d16f04a4a2593228732bab0aaa9d6f6c3b21ca7d5b6c961a003fb9842dce03b52bdd949c6c
-
Filesize
1.2MB
MD5da8cef5afbaa5a291b56ccbe8f3a5502
SHA13a1e55dc4327917f8368d132240fb9e2544d9694
SHA256cb1df0d7eafa58fdb852f8616edf8ef46c1897df9dcf6bfe7b60b23f5d7bc864
SHA512ee2aa7189b7b4801dce66ce37d10f6d91d7aac2b9aea4cbb1455a9d16f04a4a2593228732bab0aaa9d6f6c3b21ca7d5b6c961a003fb9842dce03b52bdd949c6c
-
Filesize
1.1MB
MD5ae500037d010cc1d7f266ae547d8fe94
SHA134a05d603ab040594e69340b63a38f7054743afd
SHA256f4be48b85d09da0a39e330b82a07f506fe2ee1663a32f87342594c25f8cc8451
SHA5127206ac5b15d0345867dcb8d9556aeee7c0c77fd42383204161eaeff39a7eb1ca44cdd1e354decfaecb5f6cd17e58d27aa0fe67a515ba5981f4f6e57a70494ca9
-
Filesize
1.1MB
MD5ae500037d010cc1d7f266ae547d8fe94
SHA134a05d603ab040594e69340b63a38f7054743afd
SHA256f4be48b85d09da0a39e330b82a07f506fe2ee1663a32f87342594c25f8cc8451
SHA5127206ac5b15d0345867dcb8d9556aeee7c0c77fd42383204161eaeff39a7eb1ca44cdd1e354decfaecb5f6cd17e58d27aa0fe67a515ba5981f4f6e57a70494ca9