Analysis
-
max time kernel
66s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
6a6ec075b935a1811919079b6645e38f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6a6ec075b935a1811919079b6645e38f.exe
Resource
win10v2004-20221111-en
General
-
Target
6a6ec075b935a1811919079b6645e38f.exe
-
Size
858KB
-
MD5
6a6ec075b935a1811919079b6645e38f
-
SHA1
4ae2ce6c2dc07aa42aace408bd03afe85ccd913c
-
SHA256
18c5a2b418c466198a812c3c1cf4d45e85b2db2acba84739d4ab4e299814caf5
-
SHA512
bc960e588b2bb6f96f8ab2ab89134a7bb71bac2135945bb9d3c2a433c0cdca60412699faadddf0aea9b244eadacb04042330c46f6cc923e1c74ec050977871db
-
SSDEEP
24576:xHCtn9BoO/N+SQlQXDv1jclC3CNcqZRWOsICqvf5xGZ5ZG52e9O:2QK5cljc0RWT8vfHw5Q2e9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 6a6ec075b935a1811919079b6645e38f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4296 set thread context of 4232 4296 6a6ec075b935a1811919079b6645e38f.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4012 powershell.exe 4232 6a6ec075b935a1811919079b6645e38f.exe 4232 6a6ec075b935a1811919079b6645e38f.exe 4012 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4012 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4296 wrote to memory of 4012 4296 6a6ec075b935a1811919079b6645e38f.exe 89 PID 4296 wrote to memory of 4012 4296 6a6ec075b935a1811919079b6645e38f.exe 89 PID 4296 wrote to memory of 4012 4296 6a6ec075b935a1811919079b6645e38f.exe 89 PID 4296 wrote to memory of 216 4296 6a6ec075b935a1811919079b6645e38f.exe 91 PID 4296 wrote to memory of 216 4296 6a6ec075b935a1811919079b6645e38f.exe 91 PID 4296 wrote to memory of 216 4296 6a6ec075b935a1811919079b6645e38f.exe 91 PID 4296 wrote to memory of 4232 4296 6a6ec075b935a1811919079b6645e38f.exe 93 PID 4296 wrote to memory of 4232 4296 6a6ec075b935a1811919079b6645e38f.exe 93 PID 4296 wrote to memory of 4232 4296 6a6ec075b935a1811919079b6645e38f.exe 93 PID 4296 wrote to memory of 4232 4296 6a6ec075b935a1811919079b6645e38f.exe 93 PID 4296 wrote to memory of 4232 4296 6a6ec075b935a1811919079b6645e38f.exe 93 PID 4296 wrote to memory of 4232 4296 6a6ec075b935a1811919079b6645e38f.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a6ec075b935a1811919079b6645e38f.exe"C:\Users\Admin\AppData\Local\Temp\6a6ec075b935a1811919079b6645e38f.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wVhLDw.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wVhLDw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp29B0.tmp"2⤵
- Creates scheduled task(s)
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\6a6ec075b935a1811919079b6645e38f.exe"C:\Users\Admin\AppData\Local\Temp\6a6ec075b935a1811919079b6645e38f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD512cf2bb65af8d5c7d34dcc87c070a5e1
SHA1e72b80ec97f552404d4d0cafec8fcca4f850410f
SHA256c4956a5a4be688e1951b317f0c4cd1a27d7f76a54bff11f638cd46c4bdec6bc7
SHA512553acbf33997f30dcc7d618d514f00ead79ba142f3df4ec2118592b752d7ce5da7a1e67d2d308b4500f3a34f85028eb3ea57399256724d03dfe6c1000f02fdfd