Analysis
-
max time kernel
149s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe
Resource
win10v2004-20221111-en
General
-
Target
27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe
-
Size
132KB
-
MD5
cc631ce258a788bc2a87894b0bc20f96
-
SHA1
33628af53cf100343dfbeda502eee8bce23d34e7
-
SHA256
27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed
-
SHA512
13a2b388517c5b644853a4ffb8b911475f87f0e0ee1467bfb9c45c44161590e85fabcb85794911fa9ebbbffad551eb05b2f135d8c21950828b6dfbcadaaba4ae
-
SSDEEP
1536:Znwemrk/AoZUquSKg8iomZqftJ5dXUj9GdHptP:eLk/AsDuS+ixZqftJ/XUj9GpPP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3236 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3236 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1312 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1312 wrote to memory of 4092 1312 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe 86 PID 1312 wrote to memory of 4092 1312 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe 86 PID 1312 wrote to memory of 4092 1312 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe 86 PID 4092 wrote to memory of 3236 4092 cmd.exe 88 PID 4092 wrote to memory of 3236 4092 cmd.exe 88 PID 4092 wrote to memory of 3236 4092 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe"C:\Users\Admin\AppData\Local\Temp\27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 27d31a0f89f567349af2d6ad1531c2df2d2⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-