Analysis
-
max time kernel
194s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 14:06
Behavioral task
behavioral1
Sample
c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe
Resource
win10v2004-20220812-en
General
-
Target
c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe
-
Size
206KB
-
MD5
ecce578d57f3ef52ede4dceed905b14a
-
SHA1
21cb1eec7a55a6de3ea49ce6f672bcfc059ad564
-
SHA256
c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571
-
SHA512
69d28ece2017d958254034bf0fb956a94ebb2ffded11e457e422a6a6ff494fcc3bbce47d2c55ae8ce77730cfa963cb27c645ac3de25efc28a0b4b910c824cb6e
-
SSDEEP
6144:ugqqULirVT01d6a5vR36hMmOii1i2DpFJF1:u0rVwv6a5vRMMmOii1i2FFJ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/724-132-0x0000000001000000-0x0000000001072000-memory.dmp upx behavioral2/memory/724-134-0x0000000001000000-0x0000000001072000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 724 c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 724 wrote to memory of 4592 724 c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe 84 PID 724 wrote to memory of 4592 724 c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe 84 PID 724 wrote to memory of 4592 724 c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe"C:\Users\Admin\AppData\Local\Temp\c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Users\Admin\AppData\Local\Temp\c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe"2⤵PID:4592
-