Analysis
-
max time kernel
90s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2022, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
b095fc1a12f0056f5cb0e3a31121c0e7a1941217763ff473f9cb5fd46d1d2eed.exe
Resource
win10v2004-20221111-en
General
-
Target
b095fc1a12f0056f5cb0e3a31121c0e7a1941217763ff473f9cb5fd46d1d2eed.exe
-
Size
1.7MB
-
MD5
e1f2ce87e294a3d99c531a5d96719cf3
-
SHA1
790f64d1b1ca40924c06aa5428c953eb410ee8c0
-
SHA256
b095fc1a12f0056f5cb0e3a31121c0e7a1941217763ff473f9cb5fd46d1d2eed
-
SHA512
608ae3e77fe00208495d2b0621615f05c5ede1fc889178cdd007bed3d1097efc5e93e66377c9f1dc82c903dcafa49791ae98786e22e69617bbc5277cbe0264b7
-
SSDEEP
24576:dHLmCiIhSXadHTWGBDXnn3kJvBslpNjXMlBv67646GEOFiW5AeKG7Jmq5jPhCeeV:WCHTWQ3kJpDP84lMAjG7vjP0EngDN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation b095fc1a12f0056f5cb0e3a31121c0e7a1941217763ff473f9cb5fd46d1d2eed.exe -
Loads dropped DLL 2 IoCs
pid Process 4808 rundll32.exe 1108 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings b095fc1a12f0056f5cb0e3a31121c0e7a1941217763ff473f9cb5fd46d1d2eed.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4600 wrote to memory of 2300 4600 b095fc1a12f0056f5cb0e3a31121c0e7a1941217763ff473f9cb5fd46d1d2eed.exe 80 PID 4600 wrote to memory of 2300 4600 b095fc1a12f0056f5cb0e3a31121c0e7a1941217763ff473f9cb5fd46d1d2eed.exe 80 PID 4600 wrote to memory of 2300 4600 b095fc1a12f0056f5cb0e3a31121c0e7a1941217763ff473f9cb5fd46d1d2eed.exe 80 PID 2300 wrote to memory of 4808 2300 control.exe 82 PID 2300 wrote to memory of 4808 2300 control.exe 82 PID 2300 wrote to memory of 4808 2300 control.exe 82 PID 4808 wrote to memory of 4680 4808 rundll32.exe 89 PID 4808 wrote to memory of 4680 4808 rundll32.exe 89 PID 4680 wrote to memory of 1108 4680 RunDll32.exe 90 PID 4680 wrote to memory of 1108 4680 RunDll32.exe 90 PID 4680 wrote to memory of 1108 4680 RunDll32.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b095fc1a12f0056f5cb0e3a31121c0e7a1941217763ff473f9cb5fd46d1d2eed.exe"C:\Users\Admin\AppData\Local\Temp\b095fc1a12f0056f5cb0e3a31121c0e7a1941217763ff473f9cb5fd46d1d2eed.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\je6YfEPZ.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\je6YfEPZ.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\je6YfEPZ.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\je6YfEPZ.CPL",5⤵
- Loads dropped DLL
PID:1108
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5bd90347b2eefdb672af9e92289e549bd
SHA1368cc9ce2f6f267d2cb7f3270c86ad4b583e02a5
SHA2569b4ef0ec755471f072df0e5c01db521e60ad886ecabb178d0867bf6be91aa893
SHA5121e709e4d5c9b19fcc3117ab71fddcc73c49880f8ae12dd13234aaaefca68e6003330f10b393b09489b3265ca72f65ac58aae610812e49dc6db4254d6cb2baffa
-
Filesize
1.5MB
MD5bd90347b2eefdb672af9e92289e549bd
SHA1368cc9ce2f6f267d2cb7f3270c86ad4b583e02a5
SHA2569b4ef0ec755471f072df0e5c01db521e60ad886ecabb178d0867bf6be91aa893
SHA5121e709e4d5c9b19fcc3117ab71fddcc73c49880f8ae12dd13234aaaefca68e6003330f10b393b09489b3265ca72f65ac58aae610812e49dc6db4254d6cb2baffa
-
Filesize
1.5MB
MD5bd90347b2eefdb672af9e92289e549bd
SHA1368cc9ce2f6f267d2cb7f3270c86ad4b583e02a5
SHA2569b4ef0ec755471f072df0e5c01db521e60ad886ecabb178d0867bf6be91aa893
SHA5121e709e4d5c9b19fcc3117ab71fddcc73c49880f8ae12dd13234aaaefca68e6003330f10b393b09489b3265ca72f65ac58aae610812e49dc6db4254d6cb2baffa