Overview
overview
10Static
static
ONE_00034.lnk
windows7-x64
3ONE_00034.lnk
windows10-2004-x64
7ONE_00035.lnk
windows7-x64
3ONE_00035.lnk
windows10-2004-x64
7ONE_00036.lnk
windows7-x64
3ONE_00036.lnk
windows10-2004-x64
7ONE_00037.lnk
windows7-x64
3ONE_00037.lnk
windows10-2004-x64
7OneDrive.exe
windows7-x64
1OneDrive.exe
windows10-2004-x64
1secur32.dll
windows7-x64
1secur32.dll
windows10-2004-x64
10Analysis
-
max time kernel
162s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
ONE_00034.lnk
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ONE_00034.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
ONE_00035.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
ONE_00035.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
ONE_00036.lnk
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
ONE_00036.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
ONE_00037.lnk
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
ONE_00037.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
OneDrive.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
OneDrive.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
secur32.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
secur32.dll
Resource
win10v2004-20221111-en
General
-
Target
ONE_00034.lnk
-
Size
1KB
-
MD5
6c73b331710c52ef2e51e77fa58f0157
-
SHA1
86038f1def400da07dd49234b55415d32b14a5a4
-
SHA256
a5f2c40997e7cbb29b006bc64a2594712107b18b00eccc778637dd1d193a75fd
-
SHA512
c224fadc87b5a0ff5503ac5944ddc79d18f3bf0644ea8605d5162d327d8616a2a440a155f23ef9cef4d6856405ff61da89a495c12aa13f6d3d702ee437e1867d
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 2244 wrote to memory of 2352 2244 cmd.exe cmd.exe PID 2244 wrote to memory of 2352 2244 cmd.exe cmd.exe PID 2352 wrote to memory of 2616 2352 cmd.exe OneDrive.exe PID 2352 wrote to memory of 2616 2352 cmd.exe OneDrive.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ONE_00034.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c start OneDrive.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\OneDrive.exeOneDrive.exe3⤵