Analysis

  • max time kernel
    167s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    27-04-2022 15:14

General

  • Target

    9b9240a2389a803eb3c93cdc4dfefcdfe22f4f2bbc24fb5eb593c86c1fbea5c8.exe

  • Size

    41KB

  • MD5

    5d1e4a4e7302c1c20d358978a5fcba50

  • SHA1

    b1c5289e645610db4aa891c4a08ced5d359505f1

  • SHA256

    9b9240a2389a803eb3c93cdc4dfefcdfe22f4f2bbc24fb5eb593c86c1fbea5c8

  • SHA512

    556dbe93692e55dd83580c989fb3e73e5997433d41166fd7db0eed209431ae09124589c01939a4091c4b869c4a5a2031a22eadab9342f54a02fe33ce3d1eb6ee

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b9240a2389a803eb3c93cdc4dfefcdfe22f4f2bbc24fb5eb593c86c1fbea5c8.exe
    "C:\Users\Admin\AppData\Local\Temp\9b9240a2389a803eb3c93cdc4dfefcdfe22f4f2bbc24fb5eb593c86c1fbea5c8.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\9B9240~1.EXE >> NUL
      2⤵
        PID:2124

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Browser Extensions

    1
    T1176

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2124-130-0x0000000000000000-mapping.dmp