Analysis

  • max time kernel
    203s
  • max time network
    238s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    20-02-2022 04:58

General

  • Target

    87d24edd168572f28d262c9edc2b825ea628f86e39c2d1407e9fbc42685119de.exe

  • Size

    117KB

  • MD5

    aaa963a1b4c71047d667f0c3d1760d44

  • SHA1

    90ce48d945427822647242d42678fb6fb5b77d73

  • SHA256

    87d24edd168572f28d262c9edc2b825ea628f86e39c2d1407e9fbc42685119de

  • SHA512

    c3cfc8f91ac084ba4ed03e615bd0c55ef65dae3c0618dade3eccd1e2aada1edf30b6cd03e7240b2fce19b5f4f3071ee8c39ab57b0bd073d8049982eb9aea54c8

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87d24edd168572f28d262c9edc2b825ea628f86e39c2d1407e9fbc42685119de.exe
    "C:\Users\Admin\AppData\Local\Temp\87d24edd168572f28d262c9edc2b825ea628f86e39c2d1407e9fbc42685119de.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Users\Admin\AppData\Local\Temp\lyDyPhencrep.exe
      "C:\Users\Admin\AppData\Local\Temp\lyDyPhencrep.exe" 9 REP
      2⤵
      • Executes dropped EXE
      PID:4576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lyDyPhencrep.exe
    MD5

    aaa963a1b4c71047d667f0c3d1760d44

    SHA1

    90ce48d945427822647242d42678fb6fb5b77d73

    SHA256

    87d24edd168572f28d262c9edc2b825ea628f86e39c2d1407e9fbc42685119de

    SHA512

    c3cfc8f91ac084ba4ed03e615bd0c55ef65dae3c0618dade3eccd1e2aada1edf30b6cd03e7240b2fce19b5f4f3071ee8c39ab57b0bd073d8049982eb9aea54c8

  • C:\Users\Admin\AppData\Local\Temp\lyDyPhencrep.exe
    MD5

    aaa963a1b4c71047d667f0c3d1760d44

    SHA1

    90ce48d945427822647242d42678fb6fb5b77d73

    SHA256

    87d24edd168572f28d262c9edc2b825ea628f86e39c2d1407e9fbc42685119de

    SHA512

    c3cfc8f91ac084ba4ed03e615bd0c55ef65dae3c0618dade3eccd1e2aada1edf30b6cd03e7240b2fce19b5f4f3071ee8c39ab57b0bd073d8049982eb9aea54c8