Analysis
-
max time kernel
90s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2022 12:10
Static task
static1
Behavioral task
behavioral1
Sample
Unidad USB.lnk
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Unidad USB.lnk
Resource
win10v2004-20221111-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Unidad USB.lnk
-
Size
2KB
-
MD5
82e20dd803bc4ed7dfcbb8b9726a6f7e
-
SHA1
449418b01f89f6daa99480d2e54a2cdfe078784e
-
SHA256
2692471777b1d06d69ba25ac24be3d290c4fef2a82fe2c56d78b98a3e227998d
-
SHA512
4b12665bd9b6f046a4e35b7ada751e7be46820b1a6af30c4fb2176c4869cf6108723d7ef6b2d4e21a070de0255ef1287b82a2f31d4fa4aa837c4f0a4372ebbf7
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2356 2172 cmd.exe 82 PID 2172 wrote to memory of 2356 2172 cmd.exe 82 PID 2356 wrote to memory of 1232 2356 cmd.exe 83 PID 2356 wrote to memory of 1232 2356 cmd.exe 83 PID 2356 wrote to memory of 1496 2356 cmd.exe 84 PID 2356 wrote to memory of 1496 2356 cmd.exe 84
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Unidad USB.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /y/CTYPE Xac.Bmp|cMd2⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" TYPE Xac.Bmp"3⤵PID:1232
-
-
C:\Windows\system32\cmd.execMd3⤵PID:1496
-
-