Analysis

  • max time kernel
    156s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    05-02-2022 13:35

General

  • Target

    8246f2b18a1592cc2a37c001e2415412f5e63d14220324ae8356981e25a4ba76.exe

  • Size

    365KB

  • MD5

    57217eb6e20111a0c920ad0da2d77818

  • SHA1

    2af513372e7bae653c2942effdc068a73fa72717

  • SHA256

    8246f2b18a1592cc2a37c001e2415412f5e63d14220324ae8356981e25a4ba76

  • SHA512

    92d7119dd19b366ead9e5c56fe4e4e0a70dd0a2e8a3c49925d6001be5ab509c5ab5d880e31d2d3460880f9ffb06a79a1fda5c5275dc63e0bf16ddef501020051

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 49 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8246f2b18a1592cc2a37c001e2415412f5e63d14220324ae8356981e25a4ba76.exe
    "C:\Users\Admin\AppData\Local\Temp\8246f2b18a1592cc2a37c001e2415412f5e63d14220324ae8356981e25a4ba76.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\G6rA9rodcHUQWeY5.bat" "
      2⤵
        PID:3440
    • C:\Windows\system32\MusNotifyIcon.exe
      %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
      1⤵
      • Checks processor information in registry
      PID:3100
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -p
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2604

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    3
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\G6rA9rodcHUQWeY5.bat
      MD5

      d3ed4dfce75c380085a71a42b11e1936

      SHA1

      c79ac115ed0830184a6d33659a777054e19adb22

      SHA256

      05fd1fb34164740586c713aaea2a2d71fd11a1c9fda91156462a2f76f72a4df9

      SHA512

      c984dbe7ba9b83ea0718fc154b4f43c58cba436d0c4be9111e218fc21648f6b3456c21dcc1212e8372bcac0a9b2aa0d3a50549d775caa12ea3f509e6e4e38b6f