Analysis

  • max time kernel
    135s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-04-2022 14:30

General

  • Target

    1d666de34d6ec9d29bb61134e339a4797cf7db23c0df65dbba559e7c483a57c7.exe

  • Size

    60KB

  • MD5

    9c8e695c7ff0927d9d58e123b1231fa5

  • SHA1

    0a768b881b854ecec9148ffec4a938aee1b360ef

  • SHA256

    1d666de34d6ec9d29bb61134e339a4797cf7db23c0df65dbba559e7c483a57c7

  • SHA512

    3200505c74fc437c0532d4391620aaaa0d786dc1a03045e346b22bf07c37229cb95c2aaae63282f4cf2bddd5084f56c5be98a7d01379f2b2685a4cfc8e9a1697

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d666de34d6ec9d29bb61134e339a4797cf7db23c0df65dbba559e7c483a57c7.exe
    "C:\Users\Admin\AppData\Local\Temp\1d666de34d6ec9d29bb61134e339a4797cf7db23c0df65dbba559e7c483a57c7.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" www.google.com.br
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4668
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" www.google.com.br
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3148

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads