Analysis
-
max time kernel
149s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0.exe
Resource
win10v2004-20220812-en
General
-
Target
acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0.exe
-
Size
41KB
-
MD5
6524aa014ee024031dbadc664e1b0126
-
SHA1
537aa8beb65293b9e9940e7bf2aeac880191438f
-
SHA256
acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0
-
SHA512
e878d53b30f840be0b873a8876c669a0a274956ccf81cccccfde36379ad39563e8bc37dd6030b97ec279d75d32611b158ad7b4f7960f7d8c8bb5e6dd1cb32e99
-
SSDEEP
768:QGBar1ZIZYnfI9opm6AIHIjaI7g9mVmUnmoNE/W5dRV8:fW1ZIZqI9opm6AIHIjzmUHNzd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3276 sxhost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation sxhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4028 wrote to memory of 3276 4028 acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0.exe 80 PID 4028 wrote to memory of 3276 4028 acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0.exe 80 PID 4028 wrote to memory of 3276 4028 acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0.exe 80 PID 4028 wrote to memory of 4336 4028 acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0.exe 81 PID 4028 wrote to memory of 4336 4028 acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0.exe 81 PID 4028 wrote to memory of 4336 4028 acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0.exe 81 PID 3276 wrote to memory of 2732 3276 sxhost.exe 83 PID 3276 wrote to memory of 2732 3276 sxhost.exe 83 PID 3276 wrote to memory of 2732 3276 sxhost.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0.exe"C:\Users\Admin\AppData\Local\Temp\acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\sxhost.exe"C:\Users\Admin\sxhost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\sxhost.exe >> NUL3⤵PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\ACF4A5~1.EXE >> NUL2⤵PID:4336
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD56524aa014ee024031dbadc664e1b0126
SHA1537aa8beb65293b9e9940e7bf2aeac880191438f
SHA256acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0
SHA512e878d53b30f840be0b873a8876c669a0a274956ccf81cccccfde36379ad39563e8bc37dd6030b97ec279d75d32611b158ad7b4f7960f7d8c8bb5e6dd1cb32e99
-
Filesize
41KB
MD56524aa014ee024031dbadc664e1b0126
SHA1537aa8beb65293b9e9940e7bf2aeac880191438f
SHA256acf4a55c9dce455738d9616aee08d781eda7e780aabc49c47d2bfa51f713eaf0
SHA512e878d53b30f840be0b873a8876c669a0a274956ccf81cccccfde36379ad39563e8bc37dd6030b97ec279d75d32611b158ad7b4f7960f7d8c8bb5e6dd1cb32e99