Analysis
-
max time kernel
169s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 02:29
Static task
static1
Behavioral task
behavioral1
Sample
3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe
Resource
win10v2004-20221111-en
General
-
Target
3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe
-
Size
500KB
-
MD5
55a6f3e924a18d368756c29d582a3e67
-
SHA1
4e19a9ee30d00f829ca884b0ab9b43e3d6b3f778
-
SHA256
3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604
-
SHA512
380c1cd13ce5ceab2db30d2d4a71d4a5315a8b8321dc8928cb33d34ea6aabbaccb9dffa5f783d1fb5ad1aed92701acb5601c1c7e1a419014b394e0cfe44ffa8c
-
SSDEEP
12288:ozE679I8/ZdkB7qeGvRHHVlXqgGzP+4WvX5nxzpsBc8gdlLGc8:ozD7i8ANGZH6RT+L9xaBc8gac8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3984 keygen.exe 2508 sof.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation sof.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2304 2508 WerFault.exe 86 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4520 ipconfig.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2508 sof.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2708 wrote to memory of 3984 2708 3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe 85 PID 2708 wrote to memory of 3984 2708 3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe 85 PID 2708 wrote to memory of 3984 2708 3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe 85 PID 2708 wrote to memory of 2508 2708 3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe 86 PID 2708 wrote to memory of 2508 2708 3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe 86 PID 2708 wrote to memory of 2508 2708 3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe 86 PID 2508 wrote to memory of 4520 2508 sof.exe 87 PID 2508 wrote to memory of 4520 2508 sof.exe 87 PID 2508 wrote to memory of 4520 2508 sof.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe"C:\Users\Admin\AppData\Local\Temp\3408117bdc4227a3d38df3037154b721520f896bf3705482b0c5c3bfa86ad604.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\keygen.exe"C:\Users\Admin\AppData\Local\Temp\keygen.exe"2⤵
- Executes dropped EXE
PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\sof.exe"C:\Users\Admin\AppData\Local\Temp\sof.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /release3⤵
- Gathers network information
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 9083⤵
- Program crash
PID:2304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2508 -ip 25081⤵PID:4364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD51079fb1e72cf72361eedf520c641f013
SHA192a0d5d28083408678fdbc0a0a8dadb6ccc49848
SHA2568e5f48a134ee5fc931ec15b8dc7b368a33422ffb7db25962d5a3553ae1cfae57
SHA512c9dd688dff95c34540374be41dafaba2a6cc7e91c30d2d9f89499ffe39e02e58c15fdb0435ca216bcb51be3875b7c6fcc10a2b76a1ffb6b971980ff4792c7afa
-
Filesize
50KB
MD51079fb1e72cf72361eedf520c641f013
SHA192a0d5d28083408678fdbc0a0a8dadb6ccc49848
SHA2568e5f48a134ee5fc931ec15b8dc7b368a33422ffb7db25962d5a3553ae1cfae57
SHA512c9dd688dff95c34540374be41dafaba2a6cc7e91c30d2d9f89499ffe39e02e58c15fdb0435ca216bcb51be3875b7c6fcc10a2b76a1ffb6b971980ff4792c7afa
-
Filesize
512KB
MD5323bf98564cf2c451da969c3112b08d7
SHA16009b0820241cd0443569447138d3337dd921628
SHA25617849a3ccfab5fe04b16c21bc366e8a1e677e3d7fa7385846da514314cdef667
SHA5127ec4131978b901b8fd94a29e2491edca820f0754669d11398070dcc03855c4aea6ec8c1c98846c303ebb44a6ab52fc55bb8fefe53ffa35c25757b91a6ec5a4a4
-
Filesize
512KB
MD5323bf98564cf2c451da969c3112b08d7
SHA16009b0820241cd0443569447138d3337dd921628
SHA25617849a3ccfab5fe04b16c21bc366e8a1e677e3d7fa7385846da514314cdef667
SHA5127ec4131978b901b8fd94a29e2491edca820f0754669d11398070dcc03855c4aea6ec8c1c98846c303ebb44a6ab52fc55bb8fefe53ffa35c25757b91a6ec5a4a4