Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2023, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
4206e65cef9c29abe643774f0addb00b6ac3dded05dc955dc445f5124fcc179e.exe
Resource
win10v2004-20230220-en
General
-
Target
4206e65cef9c29abe643774f0addb00b6ac3dded05dc955dc445f5124fcc179e.exe
-
Size
1.3MB
-
MD5
afde411479ee59f22693bf9858cebe14
-
SHA1
58ecf182ea9f42a47d937ec26854b659f2f759e7
-
SHA256
4206e65cef9c29abe643774f0addb00b6ac3dded05dc955dc445f5124fcc179e
-
SHA512
0ffaf4046855d9aecd237179eef2b44ce595a7daffb6506ae258b9185aa8f38e56cf9f7f65a6b9883c5ed2107f341f412cf4506ebfbeabb9c1433fa0ec382258
-
SSDEEP
24576:I/XEXjJSFHUKYZEGbbWqwaWUTMyNZyhBVrjVUaPS/AWGswbBCnvABSKs+RlnwkPC:I/oSYZEoBxDTnZ2VrjgAWUCnovs+fnrC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation 4206e65cef9c29abe643774f0addb00b6ac3dded05dc955dc445f5124fcc179e.exe -
Loads dropped DLL 2 IoCs
pid Process 4176 regsvr32.exe 4176 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2056 wrote to memory of 4176 2056 4206e65cef9c29abe643774f0addb00b6ac3dded05dc955dc445f5124fcc179e.exe 86 PID 2056 wrote to memory of 4176 2056 4206e65cef9c29abe643774f0addb00b6ac3dded05dc955dc445f5124fcc179e.exe 86 PID 2056 wrote to memory of 4176 2056 4206e65cef9c29abe643774f0addb00b6ac3dded05dc955dc445f5124fcc179e.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4206e65cef9c29abe643774f0addb00b6ac3dded05dc955dc445f5124fcc179e.exe"C:\Users\Admin\AppData\Local\Temp\4206e65cef9c29abe643774f0addb00b6ac3dded05dc955dc445f5124fcc179e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /u YUOxXB.IkA -S2⤵
- Loads dropped DLL
PID:4176
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5bfbb8e536913d92ac390c873f6a81a1e
SHA179ddcab4c1a029eabf65cec4ebcf18cfe09e4c3f
SHA25631d5777fd6cc9dad5d8257170f79457af9b0687910e2bd2b667f019014f67828
SHA512cff741971dac0eb98230be460b50dfd9560f7d0836ae76c38f11ebcba7dc874109acf2e6507619a52f0e06b9a858532ba7f2f833a43d56200ce2c46cb352aa54
-
Filesize
1.1MB
MD5bfbb8e536913d92ac390c873f6a81a1e
SHA179ddcab4c1a029eabf65cec4ebcf18cfe09e4c3f
SHA25631d5777fd6cc9dad5d8257170f79457af9b0687910e2bd2b667f019014f67828
SHA512cff741971dac0eb98230be460b50dfd9560f7d0836ae76c38f11ebcba7dc874109acf2e6507619a52f0e06b9a858532ba7f2f833a43d56200ce2c46cb352aa54
-
Filesize
1.1MB
MD5bfbb8e536913d92ac390c873f6a81a1e
SHA179ddcab4c1a029eabf65cec4ebcf18cfe09e4c3f
SHA25631d5777fd6cc9dad5d8257170f79457af9b0687910e2bd2b667f019014f67828
SHA512cff741971dac0eb98230be460b50dfd9560f7d0836ae76c38f11ebcba7dc874109acf2e6507619a52f0e06b9a858532ba7f2f833a43d56200ce2c46cb352aa54