Analysis
-
max time kernel
186s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
7d017b5c4f1eb0f5275c6db23b26fabb6099221fe39a4b3ae1c00006f201c728.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7d017b5c4f1eb0f5275c6db23b26fabb6099221fe39a4b3ae1c00006f201c728.exe
Resource
win10v2004-20220812-en
General
-
Target
7d017b5c4f1eb0f5275c6db23b26fabb6099221fe39a4b3ae1c00006f201c728.exe
-
Size
116KB
-
MD5
fae78c23193fcebd79ed0bc37bceb229
-
SHA1
195377d433b7dfaae770be8bd65385fe4b39aacf
-
SHA256
7d017b5c4f1eb0f5275c6db23b26fabb6099221fe39a4b3ae1c00006f201c728
-
SHA512
5526517c33f0447679b63c37d82fbc40e23ad1a1f8ea65ef2420554ceabe4559e27bb990b2e6aca200a383568229f20f788aecf5f5c181799b1784c34d8fdd1f
-
SSDEEP
1536:yz+TeX1Utg1E5meXe5QvcPrulffEwZWsy1lZZN7ByW02MAh:qKx5meIrulffEwZWsGBlt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 7d017b5c4f1eb0f5275c6db23b26fabb6099221fe39a4b3ae1c00006f201c728.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 7d017b5c4f1eb0f5275c6db23b26fabb6099221fe39a4b3ae1c00006f201c728.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7d017b5c4f1eb0f5275c6db23b26fabb6099221fe39a4b3ae1c00006f201c728.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4284 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 4684 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4684 AUDIODG.EXE Token: SeDebugPrivilege 4284 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4836 7d017b5c4f1eb0f5275c6db23b26fabb6099221fe39a4b3ae1c00006f201c728.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4612 4836 7d017b5c4f1eb0f5275c6db23b26fabb6099221fe39a4b3ae1c00006f201c728.exe 82 PID 4836 wrote to memory of 4612 4836 7d017b5c4f1eb0f5275c6db23b26fabb6099221fe39a4b3ae1c00006f201c728.exe 82 PID 4836 wrote to memory of 4612 4836 7d017b5c4f1eb0f5275c6db23b26fabb6099221fe39a4b3ae1c00006f201c728.exe 82 PID 4612 wrote to memory of 4284 4612 cmd.exe 84 PID 4612 wrote to memory of 4284 4612 cmd.exe 84 PID 4612 wrote to memory of 4284 4612 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d017b5c4f1eb0f5275c6db23b26fabb6099221fe39a4b3ae1c00006f201c728.exe"C:\Users\Admin\AppData\Local\Temp\7d017b5c4f1eb0f5275c6db23b26fabb6099221fe39a4b3ae1c00006f201c728.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 7d017b5c4f1eb0f5275c6db23b26fabb602⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x528 0x52c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4684