Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac.exe
Resource
win10v2004-20220812-en
General
-
Target
d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac.exe
-
Size
324KB
-
MD5
5b1a94e82706932ecb8b3bf231d33c45
-
SHA1
1dde29ec55107c496a966597433c4229cf870941
-
SHA256
d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac
-
SHA512
9f3a01a9b3b71d281cf427f46047114cbb91d527297de978db592957c631338923f92697d64670bb60fee3e964929ccec13bb331aac33ec4bb9819b4bc4febd5
-
SSDEEP
6144:VqS46YxH/uPEeO52iy6g+4a92VLMMa5pBFUByndCtoiQ:VqS46Yqn+n8NMFp7wynoG5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4204 Decrypted.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4204 Decrypted.exe 4204 Decrypted.exe 4204 Decrypted.exe 4204 Decrypted.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1096 d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1096 wrote to memory of 4204 1096 d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac.exe 81 PID 1096 wrote to memory of 4204 1096 d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac.exe 81 PID 1096 wrote to memory of 4204 1096 d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac.exe 81 PID 4204 wrote to memory of 2712 4204 Decrypted.exe 54 PID 4204 wrote to memory of 2712 4204 Decrypted.exe 54 PID 4204 wrote to memory of 2712 4204 Decrypted.exe 54 PID 4204 wrote to memory of 2712 4204 Decrypted.exe 54
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac.exe"C:\Users\Admin\AppData\Local\Temp\d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4204
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD59b251a7f0b0b3fb3a5d5b827f411df42
SHA1384864320445ab01ac13a8ddfd6e73b16cbef05e
SHA256b043d8417320ce15aea85a98e70cfea66365a2aa10c2de7a260fb7c0725c9597
SHA51249b721f7de009178dc8974de985030c47f600953f9e2887ba0db38ced20f50bcc51806f86832b01e95bb4801c6c5069b3b7e012d2176a5fef35af302bcb70a75
-
Filesize
56KB
MD59b251a7f0b0b3fb3a5d5b827f411df42
SHA1384864320445ab01ac13a8ddfd6e73b16cbef05e
SHA256b043d8417320ce15aea85a98e70cfea66365a2aa10c2de7a260fb7c0725c9597
SHA51249b721f7de009178dc8974de985030c47f600953f9e2887ba0db38ced20f50bcc51806f86832b01e95bb4801c6c5069b3b7e012d2176a5fef35af302bcb70a75