Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2023 07:41
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
364KB
-
MD5
857213733ec87a3449d87551b4e9b480
-
SHA1
50dcee9476d0a277e6594855bc2bd9d346eec34b
-
SHA256
e6f1142d31761fb10385b5f535aeebc3e0deaf71bf231fe8bb6925eb25b41759
-
SHA512
e0982c4a84bee1bbe446e082495d956e4d13d62e4b10661488a89c266ef76c14497801a2966c05fb248bb99a5c97ed474939c53a83e3dc8de6a876e755a7c9e9
-
SSDEEP
6144:kuGLs+bLo1Kd52UDsvg19UK7z+BsptYXX/ASf8JyI98vuZzxEmXCgyG:kuGw+bLEOsv+9tqsnYH/hfCKmZznS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1012 svcupdater.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4588 3544 WerFault.exe 81 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5000 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3544 wrote to memory of 5000 3544 file.exe 82 PID 3544 wrote to memory of 5000 3544 file.exe 82 PID 3544 wrote to memory of 5000 3544 file.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- Creates scheduled task(s)
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 8242⤵
- Program crash
PID:4588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3544 -ip 35441⤵PID:4972
-
C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exeC:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe1⤵
- Executes dropped EXE
PID:1012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706.7MB
MD54653267a2df738b2b87493ee2bb527bf
SHA1974f1d186a4f256565d7d71105a6f4feb32638ff
SHA2560ff801b8f6be2e598b8c45ac6321eb3f3f36c4b447b808e1874ce3a2f620ed36
SHA512fef112603ae645593140dab729f1571b95d854c2acea8da252b63d34170b186f6eacf8d48064ce747542335eaede2eb0e0200e824cd7ad78064a3c048bbc2ec5
-
Filesize
727.1MB
MD587e9ffc43edd994618d677cb13a9db18
SHA1380d0014837611d79cec1962c3cf4b7c4da26504
SHA256c84f1880bf7c7e338dfcbb07a1d8258c2bd786e969cd2f29da14fb538db074cc
SHA512613f78329cc00c121220c529083e21887c359d919897e71d86454b05cc57a2dbefeb4b437005872448e043b7a6534dcad03c6ea7e88b47bd3bdc42fc1dcf2404