Analysis
-
max time kernel
154s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 09:39
Static task
static1
Behavioral task
behavioral1
Sample
a951cd6c1ba85cfa31b957036e18b61528c2b9ac41b2872e51924d8dae5f6ef4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a951cd6c1ba85cfa31b957036e18b61528c2b9ac41b2872e51924d8dae5f6ef4.exe
Resource
win10v2004-20220812-en
General
-
Target
a951cd6c1ba85cfa31b957036e18b61528c2b9ac41b2872e51924d8dae5f6ef4.exe
-
Size
100KB
-
MD5
d525e1f53571b2db4398c10f6214fe85
-
SHA1
f0b91d9872f690f98fd3aa3c5f04bc9615053717
-
SHA256
a951cd6c1ba85cfa31b957036e18b61528c2b9ac41b2872e51924d8dae5f6ef4
-
SHA512
10f42f9b4b3d890a9ce05bd25becfe6ad6fdf3b3b8f06b7615b925528b3bf6212a4ddce5541207974d6c1bb53ecb538594f11714858ed62907c216f4ef47d75b
-
SSDEEP
3072:BRvC98Azr0DtarFOdicCGetaEVdZxvUAv:nvWatUFOdtTU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation a951cd6c1ba85cfa31b957036e18b61528c2b9ac41b2872e51924d8dae5f6ef4.exe -
Loads dropped DLL 1 IoCs
pid Process 3020 regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\abc.dll regsvr32.exe File opened for modification \??\c:\windows\SysWOW64\abc.dll regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 952 wrote to memory of 3020 952 a951cd6c1ba85cfa31b957036e18b61528c2b9ac41b2872e51924d8dae5f6ef4.exe 79 PID 952 wrote to memory of 3020 952 a951cd6c1ba85cfa31b957036e18b61528c2b9ac41b2872e51924d8dae5f6ef4.exe 79 PID 952 wrote to memory of 3020 952 a951cd6c1ba85cfa31b957036e18b61528c2b9ac41b2872e51924d8dae5f6ef4.exe 79 PID 952 wrote to memory of 4476 952 a951cd6c1ba85cfa31b957036e18b61528c2b9ac41b2872e51924d8dae5f6ef4.exe 80 PID 952 wrote to memory of 4476 952 a951cd6c1ba85cfa31b957036e18b61528c2b9ac41b2872e51924d8dae5f6ef4.exe 80 PID 952 wrote to memory of 4476 952 a951cd6c1ba85cfa31b957036e18b61528c2b9ac41b2872e51924d8dae5f6ef4.exe 80 PID 4476 wrote to memory of 4560 4476 cmd.exe 82 PID 4476 wrote to memory of 4560 4476 cmd.exe 82 PID 4476 wrote to memory of 4560 4476 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a951cd6c1ba85cfa31b957036e18b61528c2b9ac41b2872e51924d8dae5f6ef4.exe"C:\Users\Admin\AppData\Local\Temp\a951cd6c1ba85cfa31b957036e18b61528c2b9ac41b2872e51924d8dae5f6ef4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s C:\Users\Admin\AppData\Local\Temp\6F5.tmp2⤵
- Loads dropped DLL
- Drops file in System32 directory
PID:3020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\p288372250.cmd" >> NUL2⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:4560
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD56f9ecb5fba0947b92dd51912802a8eea
SHA15de4eff20c8c1cdc15ad069093c882c004823a93
SHA25674e79ebaf9db709ab6e0380f1ba78995e150dfe87337ac8221bba6b974cb53bf
SHA5128c1ef5bbd3e99fc1f2eac1cb66b4d1ed56404d7c49b7c09a877bd2dce67f47de9958735957423de03273103700a1626b26e4b5c93d782cd87a300d07a230ef12
-
Filesize
100KB
MD56f9ecb5fba0947b92dd51912802a8eea
SHA15de4eff20c8c1cdc15ad069093c882c004823a93
SHA25674e79ebaf9db709ab6e0380f1ba78995e150dfe87337ac8221bba6b974cb53bf
SHA5128c1ef5bbd3e99fc1f2eac1cb66b4d1ed56404d7c49b7c09a877bd2dce67f47de9958735957423de03273103700a1626b26e4b5c93d782cd87a300d07a230ef12
-
Filesize
320B
MD51abb8f997bf292e83315d13700da210e
SHA1a718530af9e2ed4b27488fac454449fb0a865757
SHA256788e9d165573a036611ba22ae59f4c6aaf1b76eff26a1d32508ff4e16a341981
SHA5127c80e7de07c0c21d2acd842dca1e24f6036b8d2b0e43fe9280e115317e899c09182ce43630d4b75a4edfbe4c4c0db500fc60407040c856525429067e8a16e435