Analysis
-
max time kernel
91s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2022 17:27
Static task
static1
Behavioral task
behavioral1
Sample
doc.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
doc.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
share.bat
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
share.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
strona_16.dll
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
strona_16.dll
Resource
win10v2004-20220812-en
General
-
Target
doc.lnk
-
Size
1KB
-
MD5
e2d66adfe8e20d3da5912f4ddb54875c
-
SHA1
7f590eee3ac2853471da6858f8f8c904eb92d329
-
SHA256
9f0e7f8733888b0bc95df7034e1b271f96138d12bddd0224838e064639324e0a
-
SHA512
53a8bad68b6e936b24d4aff78b24503dcc3aeb7a978a1d3e7c6304a190b804de27caa71ff706cad610a37ccde62fb97c6015c2f2741fc6fac191861d41165cb7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1048 wrote to memory of 4484 1048 cmd.exe 84 PID 1048 wrote to memory of 4484 1048 cmd.exe 84 PID 4484 wrote to memory of 4436 4484 cmd.exe 85 PID 4484 wrote to memory of 4436 4484 cmd.exe 85 PID 4484 wrote to memory of 1520 4484 cmd.exe 86 PID 4484 wrote to memory of 1520 4484 cmd.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\doc.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c share.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K copy /y /b C:\Windows\System32\rundll32.exe C:\ProgramData\2PW9sUi9sE.exe3⤵PID:4436
-
-
C:\Windows\system32\xcopy.exexcopy /h /y strona_16.dll C:\ProgramData3⤵PID:1520
-
-