Analysis
-
max time kernel
188s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 13:07
Static task
static1
Behavioral task
behavioral1
Sample
73aa0ce5d7897dd735d2158416d2e3a9843b3ca5be216c3cca419e27611533f3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
73aa0ce5d7897dd735d2158416d2e3a9843b3ca5be216c3cca419e27611533f3.exe
Resource
win10v2004-20221111-en
General
-
Target
73aa0ce5d7897dd735d2158416d2e3a9843b3ca5be216c3cca419e27611533f3.exe
-
Size
1.4MB
-
MD5
6e36ac2ce8d973299ef65713855ab9e4
-
SHA1
cdfa3aa80570101d5584365665775e1210c01bc0
-
SHA256
73aa0ce5d7897dd735d2158416d2e3a9843b3ca5be216c3cca419e27611533f3
-
SHA512
59324e706d105e98105365e5bc295edcadb0d229552762c746bf4d74befdcfdaf6887aca16f4f4f7e812c9bdcdfabedb4fcbf07af637ff6c73188bcb28b9e4e4
-
SSDEEP
24576:gZ6dYlG4FAkkYsalVHZTU+89aFQvKDgv42cRS5JGYJOUJKk6ckqm4kn1ew6/:ulG4+JYjHdl89aqvK8vr75gk/Yn1e5
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4340 CSOL透视加速版10-6.exe 2924 test.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 73aa0ce5d7897dd735d2158416d2e3a9843b3ca5be216c3cca419e27611533f3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2924 test.exe 2924 test.exe 4340 CSOL透视加速版10-6.exe 4340 CSOL透视加速版10-6.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe 2924 test.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4340 CSOL透视加速版10-6.exe 4340 CSOL透视加速版10-6.exe 4340 CSOL透视加速版10-6.exe 4340 CSOL透视加速版10-6.exe 2924 test.exe 2924 test.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2056 wrote to memory of 4340 2056 73aa0ce5d7897dd735d2158416d2e3a9843b3ca5be216c3cca419e27611533f3.exe 84 PID 2056 wrote to memory of 4340 2056 73aa0ce5d7897dd735d2158416d2e3a9843b3ca5be216c3cca419e27611533f3.exe 84 PID 2056 wrote to memory of 4340 2056 73aa0ce5d7897dd735d2158416d2e3a9843b3ca5be216c3cca419e27611533f3.exe 84 PID 2056 wrote to memory of 2924 2056 73aa0ce5d7897dd735d2158416d2e3a9843b3ca5be216c3cca419e27611533f3.exe 85 PID 2056 wrote to memory of 2924 2056 73aa0ce5d7897dd735d2158416d2e3a9843b3ca5be216c3cca419e27611533f3.exe 85 PID 2056 wrote to memory of 2924 2056 73aa0ce5d7897dd735d2158416d2e3a9843b3ca5be216c3cca419e27611533f3.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\73aa0ce5d7897dd735d2158416d2e3a9843b3ca5be216c3cca419e27611533f3.exe"C:\Users\Admin\AppData\Local\Temp\73aa0ce5d7897dd735d2158416d2e3a9843b3ca5be216c3cca419e27611533f3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\CSOL透视加速版10-6.exe"C:\Users\Admin\AppData\Local\Temp\CSOL透视加速版10-6.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD54fcc74764b1406d580d262ed064d2a84
SHA1c54c133c9d78fbaf29471d55ac6924d5c7c4a0df
SHA256c3134cdc17314c8b2d39d2e4c6f2ce38ba61f8992a6dabb0b93e80170704f8ef
SHA5126f5c213f86eb58cfaa00b9b5d61e7bed18de7e3803a18ca5a77703c7f65935e1ee0b0b046d278d3ed2117593000a53d2974e51b909a61d171c72c7524d5a9226
-
Filesize
1.4MB
MD54fcc74764b1406d580d262ed064d2a84
SHA1c54c133c9d78fbaf29471d55ac6924d5c7c4a0df
SHA256c3134cdc17314c8b2d39d2e4c6f2ce38ba61f8992a6dabb0b93e80170704f8ef
SHA5126f5c213f86eb58cfaa00b9b5d61e7bed18de7e3803a18ca5a77703c7f65935e1ee0b0b046d278d3ed2117593000a53d2974e51b909a61d171c72c7524d5a9226
-
Filesize
417KB
MD503ca44b32ab176fd48366aca93cb8e7f
SHA11ae112356192c4623586464b5f030535a179e80b
SHA2565d7e5d2f582278ca6e443ee38c9401f2e51b29b9075cb9e00eedbabca0f00dd8
SHA512c8d75d39b74f9f578eb1bf5492f95c7a73e0da88feb6099ba05e7e67fac7b653f27a0167f39dd9254ea06b5a1ba410d977170258ee994e892b04381320f607cc
-
Filesize
417KB
MD503ca44b32ab176fd48366aca93cb8e7f
SHA11ae112356192c4623586464b5f030535a179e80b
SHA2565d7e5d2f582278ca6e443ee38c9401f2e51b29b9075cb9e00eedbabca0f00dd8
SHA512c8d75d39b74f9f578eb1bf5492f95c7a73e0da88feb6099ba05e7e67fac7b653f27a0167f39dd9254ea06b5a1ba410d977170258ee994e892b04381320f607cc