Resubmissions

05-05-2022 16:22

220505-tt9c9sbafn 3

05-05-2022 16:08

220505-tlkd6sgch8 4

05-05-2022 16:06

220505-tj3sqsgch7 3

Analysis

  • max time kernel
    82s
  • max time network
    57s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    05-05-2022 16:22

General

  • Target

    GeoNetUpdateUtility.exe

  • Size

    2.5MB

  • MD5

    e3737d25abae0e870989400992d6ffc3

  • SHA1

    42af6647b43ef7d8e2b9ca6206ede15574529472

  • SHA256

    8dfd41e79ac728f1a6d988b8a73ea8f5a0a99868ad05ca33d8d9c69f1fb61e07

  • SHA512

    387baf739848e388b58f7b089295df7df42edc5e78e20b9cfd0f2211eca7ddfcb70f5c789bfac5173b98211e5b1c250ece84a7669eb41c38689d8684f606afbc

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 34 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GeoNetUpdateUtility.exe
    "C:\Users\Admin\AppData\Local\Temp\GeoNetUpdateUtility.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2596

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2596-119-0x0000000000F20000-0x00000000011B0000-memory.dmp
    Filesize

    2.6MB

  • memory/2596-120-0x00000000059B0000-0x00000000059BA000-memory.dmp
    Filesize

    40KB

  • memory/2596-121-0x0000000005AA0000-0x0000000005B4A000-memory.dmp
    Filesize

    680KB

  • memory/2596-122-0x0000000005D00000-0x0000000005D66000-memory.dmp
    Filesize

    408KB

  • memory/2596-123-0x00000000067D0000-0x00000000067D8000-memory.dmp
    Filesize

    32KB

  • memory/2596-124-0x000000000AE20000-0x000000000AE58000-memory.dmp
    Filesize

    224KB