Analysis
-
max time kernel
90s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2022, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
ceb21a4bb579c99a217b6c228678f730c86c18392598c61ec11eeee613f7c57c.exe
Resource
win10v2004-20221111-en
General
-
Target
ceb21a4bb579c99a217b6c228678f730c86c18392598c61ec11eeee613f7c57c.exe
-
Size
1.6MB
-
MD5
0f842a4ec01b35f6b2ef240e85ad37db
-
SHA1
44ec1c8c73c7508dc533d7e49a2e477e0033b879
-
SHA256
ceb21a4bb579c99a217b6c228678f730c86c18392598c61ec11eeee613f7c57c
-
SHA512
096812d1144d10b42589dcaaf52645ada9d50286b1e9f5bbb82511be95742919e910e5c3bbd03e5f207da170c087ca827d0a8aaa7195161f6af610d6e6290e8b
-
SSDEEP
24576:zry2uXzmwLXh0J0o35t5a5QZ6j6MuCc14Yfy96ihQQItVTwA/ZkBumLA3mv/wW4c:zunDhs3rt2W11Fw6XhmLA3qeeD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation ceb21a4bb579c99a217b6c228678f730c86c18392598c61ec11eeee613f7c57c.exe -
Loads dropped DLL 3 IoCs
pid Process 900 rundll32.exe 900 rundll32.exe 212 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2276 wrote to memory of 4916 2276 ceb21a4bb579c99a217b6c228678f730c86c18392598c61ec11eeee613f7c57c.exe 79 PID 2276 wrote to memory of 4916 2276 ceb21a4bb579c99a217b6c228678f730c86c18392598c61ec11eeee613f7c57c.exe 79 PID 2276 wrote to memory of 4916 2276 ceb21a4bb579c99a217b6c228678f730c86c18392598c61ec11eeee613f7c57c.exe 79 PID 4916 wrote to memory of 900 4916 control.exe 80 PID 4916 wrote to memory of 900 4916 control.exe 80 PID 4916 wrote to memory of 900 4916 control.exe 80 PID 900 wrote to memory of 2328 900 rundll32.exe 84 PID 900 wrote to memory of 2328 900 rundll32.exe 84 PID 2328 wrote to memory of 212 2328 RunDll32.exe 85 PID 2328 wrote to memory of 212 2328 RunDll32.exe 85 PID 2328 wrote to memory of 212 2328 RunDll32.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceb21a4bb579c99a217b6c228678f730c86c18392598c61ec11eeee613f7c57c.exe"C:\Users\Admin\AppData\Local\Temp\ceb21a4bb579c99a217b6c228678f730c86c18392598c61ec11eeee613f7c57c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\FJMRO8tR.P2⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\FJMRO8tR.P3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\FJMRO8tR.P4⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\FJMRO8tR.P5⤵
- Loads dropped DLL
PID:212
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58b1bba95e428087c48a48bd89a01ae60
SHA174405511acf4e78a6b485c9a9dbbb4cbb10ba43b
SHA256c316d51a273e9ba46cbc624fbeda82743aa2d3cb97db879611e4091cf4acf5a5
SHA512413b675e4d5b93ce1f3a8e8964102f0ad9d5b097c644970812e498c16cc6da53ce1aee2b321cc34ad538bade00d7773439bcefd2468ddfea1cf2824b29eeb270
-
Filesize
1.3MB
MD58b1bba95e428087c48a48bd89a01ae60
SHA174405511acf4e78a6b485c9a9dbbb4cbb10ba43b
SHA256c316d51a273e9ba46cbc624fbeda82743aa2d3cb97db879611e4091cf4acf5a5
SHA512413b675e4d5b93ce1f3a8e8964102f0ad9d5b097c644970812e498c16cc6da53ce1aee2b321cc34ad538bade00d7773439bcefd2468ddfea1cf2824b29eeb270
-
Filesize
1.3MB
MD58b1bba95e428087c48a48bd89a01ae60
SHA174405511acf4e78a6b485c9a9dbbb4cbb10ba43b
SHA256c316d51a273e9ba46cbc624fbeda82743aa2d3cb97db879611e4091cf4acf5a5
SHA512413b675e4d5b93ce1f3a8e8964102f0ad9d5b097c644970812e498c16cc6da53ce1aee2b321cc34ad538bade00d7773439bcefd2468ddfea1cf2824b29eeb270
-
Filesize
1.3MB
MD58b1bba95e428087c48a48bd89a01ae60
SHA174405511acf4e78a6b485c9a9dbbb4cbb10ba43b
SHA256c316d51a273e9ba46cbc624fbeda82743aa2d3cb97db879611e4091cf4acf5a5
SHA512413b675e4d5b93ce1f3a8e8964102f0ad9d5b097c644970812e498c16cc6da53ce1aee2b321cc34ad538bade00d7773439bcefd2468ddfea1cf2824b29eeb270