Analysis
-
max time kernel
148s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
b3963cc950498e5b381920f4baced067ac1ee7d19e29acea987e1dca0832d4ac.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b3963cc950498e5b381920f4baced067ac1ee7d19e29acea987e1dca0832d4ac.exe
Resource
win10v2004-20220812-en
General
-
Target
b3963cc950498e5b381920f4baced067ac1ee7d19e29acea987e1dca0832d4ac.exe
-
Size
128KB
-
MD5
ebab6d5f6854187077e3d8c0059cf0a3
-
SHA1
b0d35aaf842651baa9242f0254a8e6142bc0189f
-
SHA256
b3963cc950498e5b381920f4baced067ac1ee7d19e29acea987e1dca0832d4ac
-
SHA512
085d47acccc5fb773931eb205ada302dea03a7e87a1c6932c7511b1df2aa083b5d8d8f62782a1a47670bbf86d0a70bfe14b89205882b0fd3afa53a85149dde8d
-
SSDEEP
1536:w4RFLYP0hjtZ00so4pzEACaRBLAoVH1lOQYJ6iibQRVNNhK5a5aeSNg2w4DewJAb:HR40ZvNso4pzwsHh1hbaEdEn
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b3963cc950498e5b381920f4baced067ac1ee7d19e29acea987e1dca0832d4ac.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b3963cc950498e5b381920f4baced067ac1ee7d19e29acea987e1dca0832d4ac.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b3963cc950498e5b381920f4baced067ac1ee7d19e29acea987e1dca0832d4ac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1564 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1564 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4908 b3963cc950498e5b381920f4baced067ac1ee7d19e29acea987e1dca0832d4ac.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4772 4908 b3963cc950498e5b381920f4baced067ac1ee7d19e29acea987e1dca0832d4ac.exe 81 PID 4908 wrote to memory of 4772 4908 b3963cc950498e5b381920f4baced067ac1ee7d19e29acea987e1dca0832d4ac.exe 81 PID 4908 wrote to memory of 4772 4908 b3963cc950498e5b381920f4baced067ac1ee7d19e29acea987e1dca0832d4ac.exe 81 PID 4772 wrote to memory of 1564 4772 cmd.exe 83 PID 4772 wrote to memory of 1564 4772 cmd.exe 83 PID 4772 wrote to memory of 1564 4772 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3963cc950498e5b381920f4baced067ac1ee7d19e29acea987e1dca0832d4ac.exe"C:\Users\Admin\AppData\Local\Temp\b3963cc950498e5b381920f4baced067ac1ee7d19e29acea987e1dca0832d4ac.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del b3963cc950498e5b381920f4baced067ac2⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-