Analysis
-
max time kernel
224s -
max time network
247s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 18:26
Static task
static1
Behavioral task
behavioral1
Sample
2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe
Resource
win7-20220812-en
General
-
Target
2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe
-
Size
283KB
-
MD5
eb352086838f3e62929c6982938257e8
-
SHA1
190f97f6ca0e1c058506736e0b5b96e1b4a9b6e2
-
SHA256
2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1
-
SHA512
55e1bd1a6617928b74b6ec5e04ce49591f650e2a32bd38d396ce919ba59b65a8f3e27c870e71f8740205be2251954a5867a1e11fa8d94af26b0fb5e1d6cd73d2
-
SSDEEP
6144:+4LuhL2086TbM3v0ofYfyXyqLoittx18a:7mL52v0oiyXy6oCtx18a
Malware Config
Extracted
gootkit
6546
servicemanager.icu
partnerservice.xyz
-
vendor_id
6546
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.execmd.exedescription pid process target process PID 736 wrote to memory of 1356 736 2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe cmd.exe PID 736 wrote to memory of 1356 736 2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe cmd.exe PID 736 wrote to memory of 1356 736 2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe cmd.exe PID 1356 wrote to memory of 2160 1356 cmd.exe attrib.exe PID 1356 wrote to memory of 2160 1356 cmd.exe attrib.exe PID 1356 wrote to memory of 2160 1356 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe"C:\Users\Admin\AppData\Local\Temp\2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240636796.bat" "C:\Users\Admin\AppData\Local\Temp\2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe"3⤵
- Views/modifies file attributes
PID:2160
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD539821a624896546a91988a4c176f44a4
SHA17d49c732710c5d3a09848b2c77d9aa0a0347c763
SHA2568b8d6ad3b04b33dfdbf93f207c194e41f7d2ff0c5f65cb8468266017db74d6b5
SHA512e55b7a48a69d6d18eadc59fb416da28a5dc486a2ad2c44d92492f175d7ed92f299f72fdff0b4bcb6abec57784a2e2626cc4fdcf7f65289806327aac1a99e628a