Analysis
-
max time kernel
61s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2022, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
3a4fc843fea55ee700af9ca739e690e0.exe
Resource
win7-20220812-en
6 signatures
150 seconds
General
-
Target
3a4fc843fea55ee700af9ca739e690e0.exe
-
Size
371KB
-
MD5
3a4fc843fea55ee700af9ca739e690e0
-
SHA1
355974b4c3165312c59afda5f1f11224b73e25dc
-
SHA256
80e0fad3bd2c2640bcb4aa073e7195a8fac77ac92b1085ca71cf975da3de6f9d
-
SHA512
9d218a6f8f59674db9fa3ee433685b215cd8902eab33efb2dead60e0901be3a57199a4ee710b5ab2894f3cc241e591f05a78394f6089e8b36208ce4b91d6c6c9
-
SSDEEP
6144:KOUR7L0Nr4NBsR1JjXjOvlNW62F5grTPPw7n1HbwZoV0J:mBgUsRHgde5Iw7
Malware Config
Extracted
Family
nymaim
C2
45.139.105.171
85.31.46.167
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3a4fc843fea55ee700af9ca739e690e0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 2204 3540 WerFault.exe 81 176 3540 WerFault.exe 81 1028 3540 WerFault.exe 81 2248 3540 WerFault.exe 81 4528 3540 WerFault.exe 81 4184 3540 WerFault.exe 81 4468 3540 WerFault.exe 81 3860 3540 WerFault.exe 81 3120 3540 WerFault.exe 81 -
Kills process with taskkill 1 IoCs
pid Process 3564 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3564 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3540 wrote to memory of 1532 3540 3a4fc843fea55ee700af9ca739e690e0.exe 102 PID 3540 wrote to memory of 1532 3540 3a4fc843fea55ee700af9ca739e690e0.exe 102 PID 3540 wrote to memory of 1532 3540 3a4fc843fea55ee700af9ca739e690e0.exe 102 PID 1532 wrote to memory of 3564 1532 cmd.exe 106 PID 1532 wrote to memory of 3564 1532 cmd.exe 106 PID 1532 wrote to memory of 3564 1532 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a4fc843fea55ee700af9ca739e690e0.exe"C:\Users\Admin\AppData\Local\Temp\3a4fc843fea55ee700af9ca739e690e0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 4562⤵
- Program crash
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 7642⤵
- Program crash
PID:176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 7722⤵
- Program crash
PID:1028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 7722⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 8202⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 9282⤵
- Program crash
PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 10042⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 13722⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "3a4fc843fea55ee700af9ca739e690e0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\3a4fc843fea55ee700af9ca739e690e0.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "3a4fc843fea55ee700af9ca739e690e0.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 5162⤵
- Program crash
PID:3120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3540 -ip 35401⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3540 -ip 35401⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3540 -ip 35401⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3540 -ip 35401⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3540 -ip 35401⤵PID:4700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3540 -ip 35401⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3540 -ip 35401⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3540 -ip 35401⤵PID:3748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3540 -ip 35401⤵PID:4968