Overview
overview
7Static
static
3勒索12x ...e4.exe
windows7-x64
1勒索12x ...e4.exe
windows10-2004-x64
5勒索12x ...1b.exe
windows7-x64
1勒索12x ...1b.exe
windows10-2004-x64
3勒索12x ...13.exe
windows7-x64
3勒索12x ...13.exe
windows10-2004-x64
3勒索12x ...88.exe
windows7-x64
3勒索12x ...88.exe
windows10-2004-x64
3勒索12x ...30.exe
windows7-x64
6勒索12x ...30.exe
windows10-2004-x64
7勒索12x ...c0.exe
windows7-x64
1勒索12x ...c0.exe
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 13:56
Static task
static1
Behavioral task
behavioral1
Sample
勒索12x 240726/1/19f80d6a588f3515d03eb9b8e0692baf1df7deeee827c2377e201ac0cadb78e4.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
勒索12x 240726/1/19f80d6a588f3515d03eb9b8e0692baf1df7deeee827c2377e201ac0cadb78e4.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
勒索12x 240726/1/5f34856bdbb5dae28dfa973096be5fe30b69227c676c667f7e37f6451439d11b.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
勒索12x 240726/1/5f34856bdbb5dae28dfa973096be5fe30b69227c676c667f7e37f6451439d11b.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
勒索12x 240726/1/9e98c9335528c966fbe9e11c53fdba7a7cd5c9760518df8e2563327f267ef813.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
勒索12x 240726/1/9e98c9335528c966fbe9e11c53fdba7a7cd5c9760518df8e2563327f267ef813.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
勒索12x 240726/1/b6a29f656a71657d48b6db75e9b929da8358bc937cdfee714fa4f6111f286488.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
勒索12x 240726/1/b6a29f656a71657d48b6db75e9b929da8358bc937cdfee714fa4f6111f286488.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
勒索12x 240726/1/b7fb0600b6c1bd7c8adafc5a2f4e9dee0afe1a0a5c219e44dbe92fcb39ab6930.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
勒索12x 240726/1/b7fb0600b6c1bd7c8adafc5a2f4e9dee0afe1a0a5c219e44dbe92fcb39ab6930.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
勒索12x 240726/1/e7f04f0ee06f2addd4f33ecddfd4981d5f7a05f0a596d02acb630cb5377beac0.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
勒索12x 240726/1/e7f04f0ee06f2addd4f33ecddfd4981d5f7a05f0a596d02acb630cb5377beac0.exe
Resource
win10v2004-20240709-en
General
-
Target
勒索12x 240726/1/b7fb0600b6c1bd7c8adafc5a2f4e9dee0afe1a0a5c219e44dbe92fcb39ab6930.exe
-
Size
111KB
-
MD5
26a77ecd5cf48a570387f49a3915ea46
-
SHA1
944d362934f87254d32a6f370118af5b41b5eebc
-
SHA256
b7fb0600b6c1bd7c8adafc5a2f4e9dee0afe1a0a5c219e44dbe92fcb39ab6930
-
SHA512
e4d080bb86901f5954618319218a78e37824b6281468a8620be44ce83c2f2559dbc99acbf24db2a0802f8a82f9315dd5e3d596f235a7cde02862e40158efbab4
-
SSDEEP
3072:8Nxr4W396qI3szLyI2/B+d4WI/S81AaYmRl/jatN3:8j4SI3cg/BeGd1JatN3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation b7fb0600b6c1bd7c8adafc5a2f4e9dee0afe1a0a5c219e44dbe92fcb39ab6930.exe -
pid Process 1112 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7fb0600b6c1bd7c8adafc5a2f4e9dee0afe1a0a5c219e44dbe92fcb39ab6930.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1112 powershell.exe 1112 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1112 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 656 wrote to memory of 1112 656 b7fb0600b6c1bd7c8adafc5a2f4e9dee0afe1a0a5c219e44dbe92fcb39ab6930.exe 88 PID 656 wrote to memory of 1112 656 b7fb0600b6c1bd7c8adafc5a2f4e9dee0afe1a0a5c219e44dbe92fcb39ab6930.exe 88 PID 656 wrote to memory of 1112 656 b7fb0600b6c1bd7c8adafc5a2f4e9dee0afe1a0a5c219e44dbe92fcb39ab6930.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\勒索12x 240726\1\b7fb0600b6c1bd7c8adafc5a2f4e9dee0afe1a0a5c219e44dbe92fcb39ab6930.exe"C:\Users\Admin\AppData\Local\Temp\勒索12x 240726\1\b7fb0600b6c1bd7c8adafc5a2f4e9dee0afe1a0a5c219e44dbe92fcb39ab6930.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" <html> <head> <meta charset="UTF-8"> <title>Coming Soon: PythonAnywhere</title> <style> body { font-family: Helvetica, Arial, sans-serif; width: 500px; margin-left: auto; margin-right: auto; margin-top: 20px; } h1 { font-family: Trebuchet MS, Helvetica, Arial, sans-serif; } .for-site-owner { font-size: smaller; margin-top: 30px; color: gray; } </style> </head> <body> <img src="https://s3.amazonaws.com/pythonanywhere-error-images/logo-234x35.png" /> <div class="main"> <h1>Coming Soon!</h1> <p> This is going to be another great website hosted by <a href="https://www.pythonanywhere.com/">PythonAnywhere</a>. </p> <p> PythonAnywhere lets you2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82