Overview
overview
10Static
static
RR.lnk
windows7-x64
3RR.lnk
windows10-2004-x64
7sandstone/beeches.cmd
windows7-x64
1sandstone/beeches.cmd
windows10-2004-x64
1sandstone/gold.cmd
windows7-x64
1sandstone/gold.cmd
windows10-2004-x64
1sandstone/kilketh.dll
windows7-x64
10sandstone/kilketh.dll
windows10-2004-x64
10Analysis
-
max time kernel
191s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 12:08
Static task
static1
Behavioral task
behavioral1
Sample
RR.lnk
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
RR.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
sandstone/beeches.cmd
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
sandstone/beeches.cmd
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
sandstone/gold.cmd
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
sandstone/gold.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
sandstone/kilketh.dll
Resource
win7-20220812-en
General
-
Target
RR.lnk
-
Size
1KB
-
MD5
5adfb10fa942ee453862b4adbcfbca6f
-
SHA1
d76867af1d617b82a6c2c69b43f3bcef5fedcdb2
-
SHA256
4cdbdd8e0e25072b84b74a3116f532819704a43daf567ef9230d137a11631895
-
SHA512
c79e0913d046d96cfacfd4bd345d021d9868492d4ee0c9422231daf3fc0c4b8d12fb0bf78bc410cb9c82c8dc1c5e54ff581daef5e7159cfa305d3535d3d16c4c
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
cmd.execmd.execmd.exerundll32.exedescription pid process target process PID 912 wrote to memory of 4144 912 cmd.exe cmd.exe PID 912 wrote to memory of 4144 912 cmd.exe cmd.exe PID 4144 wrote to memory of 4924 4144 cmd.exe cmd.exe PID 4144 wrote to memory of 4924 4144 cmd.exe cmd.exe PID 4924 wrote to memory of 4804 4924 cmd.exe replace.exe PID 4924 wrote to memory of 4804 4924 cmd.exe replace.exe PID 4924 wrote to memory of 4888 4924 cmd.exe rundll32.exe PID 4924 wrote to memory of 4888 4924 cmd.exe rundll32.exe PID 4888 wrote to memory of 4784 4888 rundll32.exe rundll32.exe PID 4888 wrote to memory of 4784 4888 rundll32.exe rundll32.exe PID 4888 wrote to memory of 4784 4888 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RR.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sandstone\gold.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K sandstone\beeches.cmd system rundl3⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\system32\replace.exereplace C:\Windows\\system32\\rundlr32.exe C:\Users\Admin\AppData\Local\Temp /A4⤵PID:4804
-
C:\Windows\system32\rundll32.exerundll32 sandstone\\kilketh.tmp,init4⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\rundll32.exerundll32 sandstone\\kilketh.tmp,init5⤵PID:4784