Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 16:54
Static task
static1
Behavioral task
behavioral1
Sample
f119b7640320562056782c6c372d4c5da077d6eb9b596f6cd89483a1dc19a3fb.exe
Resource
win10v2004-20230220-en
General
-
Target
f119b7640320562056782c6c372d4c5da077d6eb9b596f6cd89483a1dc19a3fb.exe
-
Size
1.5MB
-
MD5
4746303dc2aaeba2e65e6019a39f6e96
-
SHA1
4bab3ebae6965f80fcc0f523d34b7c080188e036
-
SHA256
f119b7640320562056782c6c372d4c5da077d6eb9b596f6cd89483a1dc19a3fb
-
SHA512
d7cd1f9b8911f416898b1f093738f14e6fd005d796dae9ce2000cfcfa33e9adf557ed290c45c7d4ac9a119c46d41e66bf2b988061f1bf6f9b41a2262c9979d7b
-
SSDEEP
24576:gJr8tE+gHqpMywB/fFodh1M0R3lxkgGcYLvuhI2PwDNsWN46Mq4ehEe4Q:gJ4NpMyMdodHVx8LWhIwmNsWN2q4ehEQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation f119b7640320562056782c6c372d4c5da077d6eb9b596f6cd89483a1dc19a3fb.exe -
Loads dropped DLL 3 IoCs
pid Process 1156 rundll32.exe 1156 rundll32.exe 900 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings f119b7640320562056782c6c372d4c5da077d6eb9b596f6cd89483a1dc19a3fb.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4100 wrote to memory of 4364 4100 f119b7640320562056782c6c372d4c5da077d6eb9b596f6cd89483a1dc19a3fb.exe 87 PID 4100 wrote to memory of 4364 4100 f119b7640320562056782c6c372d4c5da077d6eb9b596f6cd89483a1dc19a3fb.exe 87 PID 4100 wrote to memory of 4364 4100 f119b7640320562056782c6c372d4c5da077d6eb9b596f6cd89483a1dc19a3fb.exe 87 PID 4364 wrote to memory of 1156 4364 control.exe 89 PID 4364 wrote to memory of 1156 4364 control.exe 89 PID 4364 wrote to memory of 1156 4364 control.exe 89 PID 1156 wrote to memory of 2284 1156 rundll32.exe 90 PID 1156 wrote to memory of 2284 1156 rundll32.exe 90 PID 2284 wrote to memory of 900 2284 RunDll32.exe 91 PID 2284 wrote to memory of 900 2284 RunDll32.exe 91 PID 2284 wrote to memory of 900 2284 RunDll32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f119b7640320562056782c6c372d4c5da077d6eb9b596f6cd89483a1dc19a3fb.exe"C:\Users\Admin\AppData\Local\Temp\f119b7640320562056782c6c372d4c5da077d6eb9b596f6cd89483a1dc19a3fb.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\Vh4O.cpL",2⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Vh4O.cpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Vh4O.cpL",4⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\Vh4O.cpL",5⤵
- Loads dropped DLL
PID:900
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5fc299c0551969404f888488a4d3d88bb
SHA1f4e529765e995a645653763e3bf2cb6506618ed9
SHA25635463cebf563b66b495e48922d069a8fbcfcf61b25acdac334dc2166e79bf89c
SHA51261de8ce42bbf5adedbfd7d999bba6e340b713bc949ed17be283056bcccd9fb0223bb7ca5a4678f7bb8bea59c99e30d9d4835ea59eaf6f9f37a7a91344163780a
-
Filesize
1.3MB
MD5fc299c0551969404f888488a4d3d88bb
SHA1f4e529765e995a645653763e3bf2cb6506618ed9
SHA25635463cebf563b66b495e48922d069a8fbcfcf61b25acdac334dc2166e79bf89c
SHA51261de8ce42bbf5adedbfd7d999bba6e340b713bc949ed17be283056bcccd9fb0223bb7ca5a4678f7bb8bea59c99e30d9d4835ea59eaf6f9f37a7a91344163780a
-
Filesize
1.3MB
MD5fc299c0551969404f888488a4d3d88bb
SHA1f4e529765e995a645653763e3bf2cb6506618ed9
SHA25635463cebf563b66b495e48922d069a8fbcfcf61b25acdac334dc2166e79bf89c
SHA51261de8ce42bbf5adedbfd7d999bba6e340b713bc949ed17be283056bcccd9fb0223bb7ca5a4678f7bb8bea59c99e30d9d4835ea59eaf6f9f37a7a91344163780a
-
Filesize
1.3MB
MD5fc299c0551969404f888488a4d3d88bb
SHA1f4e529765e995a645653763e3bf2cb6506618ed9
SHA25635463cebf563b66b495e48922d069a8fbcfcf61b25acdac334dc2166e79bf89c
SHA51261de8ce42bbf5adedbfd7d999bba6e340b713bc949ed17be283056bcccd9fb0223bb7ca5a4678f7bb8bea59c99e30d9d4835ea59eaf6f9f37a7a91344163780a
-
Filesize
1.3MB
MD5fc299c0551969404f888488a4d3d88bb
SHA1f4e529765e995a645653763e3bf2cb6506618ed9
SHA25635463cebf563b66b495e48922d069a8fbcfcf61b25acdac334dc2166e79bf89c
SHA51261de8ce42bbf5adedbfd7d999bba6e340b713bc949ed17be283056bcccd9fb0223bb7ca5a4678f7bb8bea59c99e30d9d4835ea59eaf6f9f37a7a91344163780a