Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe
Resource
win10v2004-20220812-en
General
-
Target
e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe
-
Size
68KB
-
MD5
b51ee2b6184db6fce89c88e60672b7b4
-
SHA1
0944a39ece7274b0087c35d2a196b91cb2e88bec
-
SHA256
e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6
-
SHA512
64d781305a234ddb772f984e8bcd41c9121bd58ad5cf99fade1dc48f7020dca32aa3f7b5bf895a40eeec3d98efc51aa95ff695e6f24a3f568862e10b0497e095
-
SSDEEP
1536:rb0nL0Qv4uFDmLpnMT2CBrnTndnXnxC1XWXBXAXzJ:kLZV9apMBBY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4864 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeSecurityPrivilege 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe Token: SeDebugPrivilege 4864 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4244 wrote to memory of 4860 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe 82 PID 4244 wrote to memory of 4860 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe 82 PID 4244 wrote to memory of 4860 4244 e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe 82 PID 4860 wrote to memory of 4864 4860 cmd.exe 84 PID 4860 wrote to memory of 4864 4860 cmd.exe 84 PID 4860 wrote to memory of 4864 4860 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe"C:\Users\Admin\AppData\Local\Temp\e761001e9dedab4ee6862fa872d782d47e1ff8a6f8ff06263bf354a1fcf414a6.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del e761001e9dedab4ee6862fa872d782d47e2⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-