Analysis
-
max time kernel
187s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
26835efacef89e0eabb42d429968d42c477d2595a7484a59f2f1e086664f1566.exe
Resource
win10v2004-20221111-en
General
-
Target
26835efacef89e0eabb42d429968d42c477d2595a7484a59f2f1e086664f1566.exe
-
Size
1.9MB
-
MD5
2ee47d33a69035ada2eb186989a3f6aa
-
SHA1
3fd077bf8bb3438bd116b3527fabab75d79cc13e
-
SHA256
26835efacef89e0eabb42d429968d42c477d2595a7484a59f2f1e086664f1566
-
SHA512
5f90808d24d1efd08b9987e81fc4088f110dcca435553478009e5b52513806c1aa408bceae11bd592d8d1cae43eaff6f5c2e35c58d20f5c3051f092e6fa9c0de
-
SSDEEP
49152:C3dd05L004tAvPX5f2e8BAf45kFVCqBH4xSqn/eATdkxE:CM5L004CX5Ob+J6qBH4xSq/eAT6m
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 26835efacef89e0eabb42d429968d42c477d2595a7484a59f2f1e086664f1566.exe -
Loads dropped DLL 2 IoCs
pid Process 2284 msiexec.exe 2284 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2284 5044 26835efacef89e0eabb42d429968d42c477d2595a7484a59f2f1e086664f1566.exe 82 PID 5044 wrote to memory of 2284 5044 26835efacef89e0eabb42d429968d42c477d2595a7484a59f2f1e086664f1566.exe 82 PID 5044 wrote to memory of 2284 5044 26835efacef89e0eabb42d429968d42c477d2595a7484a59f2f1e086664f1566.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\26835efacef89e0eabb42d429968d42c477d2595a7484a59f2f1e086664f1566.exe"C:\Users\Admin\AppData\Local\Temp\26835efacef89e0eabb42d429968d42c477d2595a7484a59f2f1e086664f1566.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" -y .\DAQRFEEI.GYW2⤵
- Loads dropped DLL
PID:2284
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD512cddf900e1cb001c69874072717233e
SHA129935b0baa0d38b15601aab1746e56fb6d83f58e
SHA256762435f961f5ab7b78f46b10baa4c56d74765b23832eb769f36a908669ae5371
SHA5121de5a924359da9895d45948f300b273244dff05e26007795daa65bb9c44b64ed12bda2a7af28e9537b37c3f1ea6d283b8d2dc24761e8b9e99d91eda399bfed21
-
Filesize
2.7MB
MD512cddf900e1cb001c69874072717233e
SHA129935b0baa0d38b15601aab1746e56fb6d83f58e
SHA256762435f961f5ab7b78f46b10baa4c56d74765b23832eb769f36a908669ae5371
SHA5121de5a924359da9895d45948f300b273244dff05e26007795daa65bb9c44b64ed12bda2a7af28e9537b37c3f1ea6d283b8d2dc24761e8b9e99d91eda399bfed21
-
Filesize
2.7MB
MD512cddf900e1cb001c69874072717233e
SHA129935b0baa0d38b15601aab1746e56fb6d83f58e
SHA256762435f961f5ab7b78f46b10baa4c56d74765b23832eb769f36a908669ae5371
SHA5121de5a924359da9895d45948f300b273244dff05e26007795daa65bb9c44b64ed12bda2a7af28e9537b37c3f1ea6d283b8d2dc24761e8b9e99d91eda399bfed21