Analysis
-
max time kernel
69s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 17:42
Static task
static1
Behavioral task
behavioral1
Sample
4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.exe
Resource
win7-20221111-en
General
-
Target
4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.exe
-
Size
286KB
-
MD5
9ed5d21bbfac7db5c250ad6d15e59d57
-
SHA1
72ff57e684208d64542968f64203bed304522379
-
SHA256
4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5
-
SHA512
953ee514e9b558c1dc2212914949e5461bce76ac1bade5ece14540a697b23ed452f4f0aba16c7a2e11278f6e88095f1c3a976e9f2c9b4c69f550fe8373971db3
-
SSDEEP
6144:K0gxemAEsSJ0p5oZWVwQo6LfGoUaPCyUG1sefgWsV1KC:K711Op5oIVwQo69H52eoWsVr
Malware Config
Extracted
gootkit
6546
servicemanager.icu
partnerservice.xyz
-
vendor_id
6546
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.execmd.exedescription pid process target process PID 4348 wrote to memory of 1756 4348 4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.exe cmd.exe PID 4348 wrote to memory of 1756 4348 4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.exe cmd.exe PID 4348 wrote to memory of 1756 4348 4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.exe cmd.exe PID 1756 wrote to memory of 804 1756 cmd.exe attrib.exe PID 1756 wrote to memory of 804 1756 cmd.exe attrib.exe PID 1756 wrote to memory of 804 1756 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.exe"C:\Users\Admin\AppData\Local\Temp\4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240574828.bat" "C:\Users\Admin\AppData\Local\Temp\4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\4d0396d7923a7bdccac984adf6c725b44ae58e1418daa81d9fd01fcbb658b4e5.exe"3⤵
- Views/modifies file attributes
PID:804
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5946a590fd9252ff9a7b7ca292faf26e9
SHA133d6191d0be5f1aca09524fc7d26a4854e868973
SHA2567f943378990d7ab575c6c82d34f17d9e28831efbab663ab704805f338db2787a
SHA512a2c6fd8cae4488859e216df0a4575ec0fceaf604ae5000108d02d17d77434460d22d32897010707f02e22950b3f6fe14063cbf44483040eff539484422abdf0c