Analysis
-
max time kernel
111s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2023, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
2a21da4175eee4fcf3287e4bf3e5427d5270232558329c4ca4b34f04341ef6a5.exe
Resource
win10v2004-20221111-en
General
-
Target
2a21da4175eee4fcf3287e4bf3e5427d5270232558329c4ca4b34f04341ef6a5.exe
-
Size
1.6MB
-
MD5
14e3b9b38c97efba12cf90755dc71579
-
SHA1
67e0fd88bbeddacb0e0303a51bdf93746b4f9ce9
-
SHA256
2a21da4175eee4fcf3287e4bf3e5427d5270232558329c4ca4b34f04341ef6a5
-
SHA512
c4a282dca0f132befc1f87bccfab7226f269f7f1ad3f4538ab6034ae1f1f83a11add89d04715f486ebd849acffa10d790c48e14bf6a05440e6d1b1002e15cd22
-
SSDEEP
49152:/eZBYBfJXAElWD+D2Emnahm/dT8NqULagbQZ65zcy48YloLi0:/eZBYBfKElTKEZqZ8eyQZQzcy48YloL9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 2a21da4175eee4fcf3287e4bf3e5427d5270232558329c4ca4b34f04341ef6a5.exe -
Loads dropped DLL 4 IoCs
pid Process 636 rundll32.exe 636 rundll32.exe 1144 rundll32.exe 1144 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings 2a21da4175eee4fcf3287e4bf3e5427d5270232558329c4ca4b34f04341ef6a5.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4720 wrote to memory of 4264 4720 2a21da4175eee4fcf3287e4bf3e5427d5270232558329c4ca4b34f04341ef6a5.exe 81 PID 4720 wrote to memory of 4264 4720 2a21da4175eee4fcf3287e4bf3e5427d5270232558329c4ca4b34f04341ef6a5.exe 81 PID 4720 wrote to memory of 4264 4720 2a21da4175eee4fcf3287e4bf3e5427d5270232558329c4ca4b34f04341ef6a5.exe 81 PID 4264 wrote to memory of 636 4264 control.exe 83 PID 4264 wrote to memory of 636 4264 control.exe 83 PID 4264 wrote to memory of 636 4264 control.exe 83 PID 636 wrote to memory of 696 636 rundll32.exe 84 PID 636 wrote to memory of 696 636 rundll32.exe 84 PID 696 wrote to memory of 1144 696 RunDll32.exe 85 PID 696 wrote to memory of 1144 696 RunDll32.exe 85 PID 696 wrote to memory of 1144 696 RunDll32.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a21da4175eee4fcf3287e4bf3e5427d5270232558329c4ca4b34f04341ef6a5.exe"C:\Users\Admin\AppData\Local\Temp\2a21da4175eee4fcf3287e4bf3e5427d5270232558329c4ca4b34f04341ef6a5.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\2SOS.cPL",2⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\2SOS.cPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\2SOS.cPL",4⤵
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\2SOS.cPL",5⤵
- Loads dropped DLL
PID:1144
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5ce08a0f2f4ac10613fea98fc23c31bf3
SHA13b50a4cb552002416011cec7a1097d1baa7fc52b
SHA2564b0df36827527b0cae1069a020b21245922593a9b9f7e5001ccac7312ed759ae
SHA512d2fea09b50c10612ffab278e69d2e870d2d4f01e6f3e1c9db24e8e6864902c96da6d4ef7041e352cc47e333f7d4ff7c85cd98cfd8c00913ea3f981a92a2ef700
-
Filesize
1.5MB
MD5ce08a0f2f4ac10613fea98fc23c31bf3
SHA13b50a4cb552002416011cec7a1097d1baa7fc52b
SHA2564b0df36827527b0cae1069a020b21245922593a9b9f7e5001ccac7312ed759ae
SHA512d2fea09b50c10612ffab278e69d2e870d2d4f01e6f3e1c9db24e8e6864902c96da6d4ef7041e352cc47e333f7d4ff7c85cd98cfd8c00913ea3f981a92a2ef700
-
Filesize
1.5MB
MD5ce08a0f2f4ac10613fea98fc23c31bf3
SHA13b50a4cb552002416011cec7a1097d1baa7fc52b
SHA2564b0df36827527b0cae1069a020b21245922593a9b9f7e5001ccac7312ed759ae
SHA512d2fea09b50c10612ffab278e69d2e870d2d4f01e6f3e1c9db24e8e6864902c96da6d4ef7041e352cc47e333f7d4ff7c85cd98cfd8c00913ea3f981a92a2ef700
-
Filesize
1.5MB
MD5ce08a0f2f4ac10613fea98fc23c31bf3
SHA13b50a4cb552002416011cec7a1097d1baa7fc52b
SHA2564b0df36827527b0cae1069a020b21245922593a9b9f7e5001ccac7312ed759ae
SHA512d2fea09b50c10612ffab278e69d2e870d2d4f01e6f3e1c9db24e8e6864902c96da6d4ef7041e352cc47e333f7d4ff7c85cd98cfd8c00913ea3f981a92a2ef700
-
Filesize
1.5MB
MD5ce08a0f2f4ac10613fea98fc23c31bf3
SHA13b50a4cb552002416011cec7a1097d1baa7fc52b
SHA2564b0df36827527b0cae1069a020b21245922593a9b9f7e5001ccac7312ed759ae
SHA512d2fea09b50c10612ffab278e69d2e870d2d4f01e6f3e1c9db24e8e6864902c96da6d4ef7041e352cc47e333f7d4ff7c85cd98cfd8c00913ea3f981a92a2ef700