Analysis

  • max time kernel
    4264961s
  • max time network
    17s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    17-01-2022 19:37

General

  • Target

    3964A1E13D2B3EE0C3C34B50D4785907C3FFD560DC3E4.exe

  • Size

    6.4MB

  • MD5

    678dc8e63902a1aadb46ad4a08de7f1c

  • SHA1

    d8cb7816fcc2b652df45a8da892d04dd9aa5c45f

  • SHA256

    3964a1e13d2b3ee0c3c34b50d4785907c3ffd560dc3e4a8b22906893c8db9848

  • SHA512

    cf97095d22e74462ab5960ae709ecef7e0f47ec3b80ae2c84a72ec6e4b2826164520b38a20c36a7e18da99422bb05d81e9a3aa60201224a020aa31d07eb828f7

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3964A1E13D2B3EE0C3C34B50D4785907C3FFD560DC3E4.exe
    "C:\Users\Admin\AppData\Local\Temp\3964A1E13D2B3EE0C3C34B50D4785907C3FFD560DC3E4.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Users\Admin\AppData\Local\Temp\7zS4D608B66\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS4D608B66\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3976

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS4D608B66\libcurl.dll
    MD5

    d09be1f47fd6b827c81a4812b4f7296f

    SHA1

    028ae3596c0790e6d7f9f2f3c8e9591527d267f7

    SHA256

    0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

    SHA512

    857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

  • C:\Users\Admin\AppData\Local\Temp\7zS4D608B66\libcurl.dll
    MD5

    cc372f4ec32a63fdd2b6b03f529b5193

    SHA1

    f877d781a79c743392b5fbd269164a01acc2ad7e

    SHA256

    d0fc34864d2992b4938fb8fb9ff0f1e885f49c72837c7c998c151bb2f16a87ef

    SHA512

    053aeb4a7faa0bdbe659d81d8d45b8f442f2c37adcbac39eee6b6dab81ef9081e69f9da05e214741f9c9eb9c955a3b6db02fa5a58ac34abc6c67dbc750d84621

  • C:\Users\Admin\AppData\Local\Temp\7zS4D608B66\libcurl.dll
    MD5

    205296dfb82de5369f51d440a0a0989f

    SHA1

    5b8961b0c650e2151698c1aa7863d8b7f4361bc1

    SHA256

    c14100ca601782f6fcc9af29ce3bc89044b6be83306bb80f1dd930e2305b1c6c

    SHA512

    266ee3ac05271a21644fa7e110d0e28ba267f4d52d873d52b7764b4cf226820a8dd1fde406e8b1a775304071f10b5009993530b945ca594992b6e6b3c8a267b5

  • C:\Users\Admin\AppData\Local\Temp\7zS4D608B66\libcurlpp.dll
    MD5

    e6e578373c2e416289a8da55f1dc5e8e

    SHA1

    b601a229b66ec3d19c2369b36216c6f6eb1c063e

    SHA256

    43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

    SHA512

    9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

  • C:\Users\Admin\AppData\Local\Temp\7zS4D608B66\libcurlpp.dll
    MD5

    e6e578373c2e416289a8da55f1dc5e8e

    SHA1

    b601a229b66ec3d19c2369b36216c6f6eb1c063e

    SHA256

    43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

    SHA512

    9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

  • C:\Users\Admin\AppData\Local\Temp\7zS4D608B66\libgcc_s_dw2-1.dll
    MD5

    9aec524b616618b0d3d00b27b6f51da1

    SHA1

    64264300801a353db324d11738ffed876550e1d3

    SHA256

    59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

    SHA512

    0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

  • C:\Users\Admin\AppData\Local\Temp\7zS4D608B66\libgcc_s_dw2-1.dll
    MD5

    9aec524b616618b0d3d00b27b6f51da1

    SHA1

    64264300801a353db324d11738ffed876550e1d3

    SHA256

    59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

    SHA512

    0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

  • C:\Users\Admin\AppData\Local\Temp\7zS4D608B66\libwinpthread-1.dll
    MD5

    1e0d62c34ff2e649ebc5c372065732ee

    SHA1

    fcfaa36ba456159b26140a43e80fbd7e9d9af2de

    SHA256

    509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

    SHA512

    3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

  • C:\Users\Admin\AppData\Local\Temp\7zS4D608B66\libwinpthread-1.dll
    MD5

    1e0d62c34ff2e649ebc5c372065732ee

    SHA1

    fcfaa36ba456159b26140a43e80fbd7e9d9af2de

    SHA256

    509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

    SHA512

    3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

  • C:\Users\Admin\AppData\Local\Temp\7zS4D608B66\setup_install.exe
    MD5

    9f3caa555369922987eabb91e5b4abe5

    SHA1

    fbe3ac44c19661790cda3c37398e55d22d77796b

    SHA256

    88110e77bca92bedb4212b2038f6f91bc803aefca6b22d74ed78aec4054e9910

    SHA512

    6a8f29cf5255b5512850da68f0e4faada79670deb8ec12501011958acc5f40554e04153ae868acf9f0cd2c02d28a4e43551f4a1e06b2590a2d3451256b191d5f

  • C:\Users\Admin\AppData\Local\Temp\7zS4D608B66\setup_install.exe
    MD5

    97504ae9413eecc09de941bcb6b33068

    SHA1

    87388b4017f7da2b41a33918acae6dffc88ee662

    SHA256

    6fd410dc58bc2748171445185d47d21d0383fb340aa1d390f15ae9cf9cada2e3

    SHA512

    c140f4120754b4668bdf7821983a353b0e51be564e87aa657426039cadb5d6967e613eed82a64e404fff99118ddae8cca4e17850cf864eab9ba7c515b90d99d6

  • memory/3976-130-0x0000000000000000-mapping.dmp