Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 01:57
Static task
static1
Behavioral task
behavioral1
Sample
ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093.exe
Resource
win10v2004-20230220-en
General
-
Target
ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093.exe
-
Size
37KB
-
MD5
a4f1dac57e64443c9b2ad86f7c9eb904
-
SHA1
d1464c0292bc873317ff5de308bd66ceb44c89c3
-
SHA256
ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093
-
SHA512
39fdcce28f3ccb568e78a3a723648487521692d36adc61f7327e2291423d84459433680aa340f8c02548f35e69d8c855bcc3c090d85dfa26ce2caa7920e2b725
-
SSDEEP
768:O8kr2D6AKlLO+SNhBgCHDck4MV0ggv8KoETBB9D3xvjHhx4eC7Xj8Qc1El:B/6A0q5HDR4oWBx3xrBx41z8QcKl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 rasautou.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\v2.0_2.0.0.0__9f1321c6e6a81305\rasautou.exe:Zone.Identifier ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4208 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe 2812 rasautou.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2000 wrote to memory of 5000 2000 ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093.exe 98 PID 2000 wrote to memory of 5000 2000 ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093.exe 98 PID 2000 wrote to memory of 5000 2000 ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093.exe 98 PID 5000 wrote to memory of 4208 5000 cmd.exe 100 PID 5000 wrote to memory of 4208 5000 cmd.exe 100 PID 5000 wrote to memory of 4208 5000 cmd.exe 100 PID 5000 wrote to memory of 1936 5000 cmd.exe 101 PID 5000 wrote to memory of 1936 5000 cmd.exe 101 PID 5000 wrote to memory of 1936 5000 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093.exe"C:\Users\Admin\AppData\Local\Temp\ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093.exe"1⤵
- Checks computer location settings
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c ping -n 2 127.0.0.1 > NUL & fsutil file setzerodata offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093.exe" & del "C:\Users\Admin\AppData\Local\Temp\ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093.exe" > NUL & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:4208
-
-
C:\Windows\SysWOW64\fsutil.exefsutil file setzerodata offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093.exe"3⤵PID:1936
-
-
-
C:\ProgramData\Microsoft\v2.0_2.0.0.0__9f1321c6e6a81305\rasautou.exeC:\ProgramData\Microsoft\v2.0_2.0.0.0__9f1321c6e6a81305\rasautou.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2812
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5a4f1dac57e64443c9b2ad86f7c9eb904
SHA1d1464c0292bc873317ff5de308bd66ceb44c89c3
SHA256ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093
SHA51239fdcce28f3ccb568e78a3a723648487521692d36adc61f7327e2291423d84459433680aa340f8c02548f35e69d8c855bcc3c090d85dfa26ce2caa7920e2b725
-
Filesize
37KB
MD5a4f1dac57e64443c9b2ad86f7c9eb904
SHA1d1464c0292bc873317ff5de308bd66ceb44c89c3
SHA256ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093
SHA51239fdcce28f3ccb568e78a3a723648487521692d36adc61f7327e2291423d84459433680aa340f8c02548f35e69d8c855bcc3c090d85dfa26ce2caa7920e2b725
-
Filesize
37KB
MD5a4f1dac57e64443c9b2ad86f7c9eb904
SHA1d1464c0292bc873317ff5de308bd66ceb44c89c3
SHA256ed115f25a76a710015df55b8930e4b8533394e426caa0b173599f44e19593093
SHA51239fdcce28f3ccb568e78a3a723648487521692d36adc61f7327e2291423d84459433680aa340f8c02548f35e69d8c855bcc3c090d85dfa26ce2caa7920e2b725