Analysis
-
max time kernel
90s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2022, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
6250b065f6a2171fc1a60b1c2b87c2810bb31d5303213477985545fcf59e0d41.exe
Resource
win10v2004-20221111-en
General
-
Target
6250b065f6a2171fc1a60b1c2b87c2810bb31d5303213477985545fcf59e0d41.exe
-
Size
1.6MB
-
MD5
bc47e17765e3e12020c32367368dca4e
-
SHA1
26c6063d1068577125fad5b9b5d57c4533a64906
-
SHA256
6250b065f6a2171fc1a60b1c2b87c2810bb31d5303213477985545fcf59e0d41
-
SHA512
29208b2592a12b37bae90bf2ed076ae5de45abe9ebc93c5b60d9bae7b2beae8c1f0bdfdabeff3e5a321ee034aedb22357579f075105552331f178827ec797298
-
SSDEEP
49152:gJ4NEnDk+U0wrsYjTGT+mEmnEjpkCfo8upVKcsLZfCO:gJ4ED8CMTuEmnOfTuzFs9fCO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 6250b065f6a2171fc1a60b1c2b87c2810bb31d5303213477985545fcf59e0d41.exe -
Loads dropped DLL 2 IoCs
pid Process 1140 rundll32.exe 3624 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2420 wrote to memory of 4128 2420 6250b065f6a2171fc1a60b1c2b87c2810bb31d5303213477985545fcf59e0d41.exe 81 PID 2420 wrote to memory of 4128 2420 6250b065f6a2171fc1a60b1c2b87c2810bb31d5303213477985545fcf59e0d41.exe 81 PID 2420 wrote to memory of 4128 2420 6250b065f6a2171fc1a60b1c2b87c2810bb31d5303213477985545fcf59e0d41.exe 81 PID 4128 wrote to memory of 1140 4128 control.exe 82 PID 4128 wrote to memory of 1140 4128 control.exe 82 PID 4128 wrote to memory of 1140 4128 control.exe 82 PID 1140 wrote to memory of 2116 1140 rundll32.exe 87 PID 1140 wrote to memory of 2116 1140 rundll32.exe 87 PID 2116 wrote to memory of 3624 2116 RunDll32.exe 88 PID 2116 wrote to memory of 3624 2116 RunDll32.exe 88 PID 2116 wrote to memory of 3624 2116 RunDll32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6250b065f6a2171fc1a60b1c2b87c2810bb31d5303213477985545fcf59e0d41.exe"C:\Users\Admin\AppData\Local\Temp\6250b065f6a2171fc1a60b1c2b87c2810bb31d5303213477985545fcf59e0d41.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\QIbDC.Zl2⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\QIbDC.Zl3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\QIbDC.Zl4⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\QIbDC.Zl5⤵
- Loads dropped DLL
PID:3624
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5cc2c9acdd77c72c81b9b35aea7bc6737
SHA17e024e91799c7d6b6ade49491e851a13177b0c01
SHA2568422b191bd16000d63d479375cd3b59f28f6f4dc63ca17cd311a70e2afe83be9
SHA51222daca9dd4921312ca2c3428cb5465808776cce2786e86851d9807f68c1a70b620c2e1d1af863b022f46b2425cd249dd27d6a9da4cdf5ee3771951b8596ef7ea
-
Filesize
1.5MB
MD5cc2c9acdd77c72c81b9b35aea7bc6737
SHA17e024e91799c7d6b6ade49491e851a13177b0c01
SHA2568422b191bd16000d63d479375cd3b59f28f6f4dc63ca17cd311a70e2afe83be9
SHA51222daca9dd4921312ca2c3428cb5465808776cce2786e86851d9807f68c1a70b620c2e1d1af863b022f46b2425cd249dd27d6a9da4cdf5ee3771951b8596ef7ea
-
Filesize
1.5MB
MD5cc2c9acdd77c72c81b9b35aea7bc6737
SHA17e024e91799c7d6b6ade49491e851a13177b0c01
SHA2568422b191bd16000d63d479375cd3b59f28f6f4dc63ca17cd311a70e2afe83be9
SHA51222daca9dd4921312ca2c3428cb5465808776cce2786e86851d9807f68c1a70b620c2e1d1af863b022f46b2425cd249dd27d6a9da4cdf5ee3771951b8596ef7ea