Analysis
-
max time kernel
168s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 05:51
Static task
static1
Behavioral task
behavioral1
Sample
2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe
Resource
win10v2004-20220812-en
General
-
Target
2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe
-
Size
163KB
-
MD5
3f042fd6b9ce7e23b3c84c6f7323dd75
-
SHA1
54ac7b92778cffafe3f2e4d00d75a21bb1db8e4d
-
SHA256
2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a
-
SHA512
c4094027e6689fe25e8cfe56f96748771b9dbc7f268a8508d991b39e257ef0ab8b0f24c727cf6ea57e8886e9bbf458bd83fbbd77bd12cd7183ef2afc5495cb34
-
SSDEEP
3072:uTsrMCLiv1CxwVdIsSV+WCdpJHsTJuIiw5ExOWhdKN2b3yzD8ACQqiLji1CoL:xrGdU/8dpODiZxOgdVeCQqiLRQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1696 explorer.exe 4904 explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\%appdata% = "\"C:\\Users\\Admin\\appdata\\local\\explorer.exe\"" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2800 set thread context of 3708 2800 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 79 PID 1696 set thread context of 4904 1696 explorer.exe 81 -
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\explorer.exe 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe File created \??\c:\windows\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2800 wrote to memory of 3708 2800 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 79 PID 2800 wrote to memory of 3708 2800 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 79 PID 2800 wrote to memory of 3708 2800 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 79 PID 2800 wrote to memory of 3708 2800 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 79 PID 2800 wrote to memory of 3708 2800 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 79 PID 2800 wrote to memory of 3708 2800 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 79 PID 2800 wrote to memory of 3708 2800 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 79 PID 2800 wrote to memory of 3708 2800 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 79 PID 2800 wrote to memory of 3708 2800 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 79 PID 2800 wrote to memory of 3708 2800 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 79 PID 2800 wrote to memory of 3708 2800 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 79 PID 3708 wrote to memory of 1696 3708 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 80 PID 3708 wrote to memory of 1696 3708 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 80 PID 3708 wrote to memory of 1696 3708 2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe 80 PID 1696 wrote to memory of 4904 1696 explorer.exe 81 PID 1696 wrote to memory of 4904 1696 explorer.exe 81 PID 1696 wrote to memory of 4904 1696 explorer.exe 81 PID 1696 wrote to memory of 4904 1696 explorer.exe 81 PID 1696 wrote to memory of 4904 1696 explorer.exe 81 PID 1696 wrote to memory of 4904 1696 explorer.exe 81 PID 1696 wrote to memory of 4904 1696 explorer.exe 81 PID 1696 wrote to memory of 4904 1696 explorer.exe 81 PID 1696 wrote to memory of 4904 1696 explorer.exe 81 PID 1696 wrote to memory of 4904 1696 explorer.exe 81 PID 1696 wrote to memory of 4904 1696 explorer.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe"C:\Users\Admin\AppData\Local\Temp\2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe"C:\Users\Admin\AppData\Local\Temp\2ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\appdata\local\explorer.exe"C:\Users\Admin\appdata\local\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\appdata\local\explorer.exe"C:\Users\Admin\appdata\local\explorer.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:4904
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD53f042fd6b9ce7e23b3c84c6f7323dd75
SHA154ac7b92778cffafe3f2e4d00d75a21bb1db8e4d
SHA2562ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a
SHA512c4094027e6689fe25e8cfe56f96748771b9dbc7f268a8508d991b39e257ef0ab8b0f24c727cf6ea57e8886e9bbf458bd83fbbd77bd12cd7183ef2afc5495cb34
-
Filesize
163KB
MD53f042fd6b9ce7e23b3c84c6f7323dd75
SHA154ac7b92778cffafe3f2e4d00d75a21bb1db8e4d
SHA2562ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a
SHA512c4094027e6689fe25e8cfe56f96748771b9dbc7f268a8508d991b39e257ef0ab8b0f24c727cf6ea57e8886e9bbf458bd83fbbd77bd12cd7183ef2afc5495cb34
-
Filesize
163KB
MD53f042fd6b9ce7e23b3c84c6f7323dd75
SHA154ac7b92778cffafe3f2e4d00d75a21bb1db8e4d
SHA2562ffb223e70a5124340e1c3d4f6d3e8eec726f32db9cea62f584d7440f9e1955a
SHA512c4094027e6689fe25e8cfe56f96748771b9dbc7f268a8508d991b39e257ef0ab8b0f24c727cf6ea57e8886e9bbf458bd83fbbd77bd12cd7183ef2afc5495cb34