Analysis

  • max time kernel
    90s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    02-06-2022 07:04

General

  • Target

    cfd33d516ee92bc96d6eb380b7f8e7fb.exe

  • Size

    3.0MB

  • MD5

    cfd33d516ee92bc96d6eb380b7f8e7fb

  • SHA1

    8b1a6c2d8430ad40674d7aa9b564261c8b5f4f85

  • SHA256

    66f7d8cb4ae8a8a1a9989f4a66070f9d7eefa029e2c7ff575e447827abbfcb0b

  • SHA512

    53180a9fcc2dce7fb0edbf2831a079804430f2b2255dd76b2c337dc0628f3fde69535668fba86a34530fac4956df3ad671f2ad3e6497130b2cf9f5d64e7d3481

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfd33d516ee92bc96d6eb380b7f8e7fb.exe
    "C:\Users\Admin\AppData\Local\Temp\cfd33d516ee92bc96d6eb380b7f8e7fb.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CCF9.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\cfd33d516ee92bc96d6eb380b7f8e7fb.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4512
      • C:\Users\Admin\AppData\Local\Temp\CCF9.tmp\dllhost.exe
        dllhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4148
        • C:\Users\Admin\AppData\Local\Temp\CCF9.tmp\dllhost.exe
          "C:\Users\Admin\AppData\Local\Temp\CCF9.tmp\dllhost.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetWindowsHookEx
          PID:3636
      • C:\Users\Admin\AppData\Local\Temp\CCF9.tmp\crac.exe
        crac.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4104
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4bc 0x2f4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:440

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CCF9.tmp\crac.exe

    Filesize

    2.2MB

    MD5

    c22f4bdea9cb2b92b363b7ca84e98992

    SHA1

    6a55b2b4d5933cf37bb419f48758e9d011b32a09

    SHA256

    1e7d93b7da6d178a92f1c8cce77edc31d2e85bf05f957dd5212a2a94a63c4926

    SHA512

    6797bc5872d7df2f7685cce66c089ace45021a8c3858d73e5744691d569e03dd3cbe4c7c458019ce482cdf702be5d9543e452337a9832abbef7e5239f5e50509

  • C:\Users\Admin\AppData\Local\Temp\CCF9.tmp\crac.exe

    Filesize

    2.2MB

    MD5

    c22f4bdea9cb2b92b363b7ca84e98992

    SHA1

    6a55b2b4d5933cf37bb419f48758e9d011b32a09

    SHA256

    1e7d93b7da6d178a92f1c8cce77edc31d2e85bf05f957dd5212a2a94a63c4926

    SHA512

    6797bc5872d7df2f7685cce66c089ace45021a8c3858d73e5744691d569e03dd3cbe4c7c458019ce482cdf702be5d9543e452337a9832abbef7e5239f5e50509

  • C:\Users\Admin\AppData\Local\Temp\CCF9.tmp\dllhost.exe

    Filesize

    84KB

    MD5

    d8e0462c633785181b5b31ea98308a0b

    SHA1

    69809c0237167c9666ef2b50aa1694e2a8ca38ac

    SHA256

    5ebb3cc4e09a0fb9434d07543cd821538008462dc037c6d6323a32b8bd26dd6e

    SHA512

    0e63d4e2d765005bca3647109315bbac9bb6ea0a640212ffbbeaa949043dc1f36396265c5c4ad80e1cd0701b03ebcbd1c0938df4fbd1e48528feaf997df65aee

  • C:\Users\Admin\AppData\Local\Temp\CCF9.tmp\dllhost.exe

    Filesize

    84KB

    MD5

    d8e0462c633785181b5b31ea98308a0b

    SHA1

    69809c0237167c9666ef2b50aa1694e2a8ca38ac

    SHA256

    5ebb3cc4e09a0fb9434d07543cd821538008462dc037c6d6323a32b8bd26dd6e

    SHA512

    0e63d4e2d765005bca3647109315bbac9bb6ea0a640212ffbbeaa949043dc1f36396265c5c4ad80e1cd0701b03ebcbd1c0938df4fbd1e48528feaf997df65aee

  • C:\Users\Admin\AppData\Local\Temp\CCF9.tmp\dllhost.exe

    Filesize

    84KB

    MD5

    d8e0462c633785181b5b31ea98308a0b

    SHA1

    69809c0237167c9666ef2b50aa1694e2a8ca38ac

    SHA256

    5ebb3cc4e09a0fb9434d07543cd821538008462dc037c6d6323a32b8bd26dd6e

    SHA512

    0e63d4e2d765005bca3647109315bbac9bb6ea0a640212ffbbeaa949043dc1f36396265c5c4ad80e1cd0701b03ebcbd1c0938df4fbd1e48528feaf997df65aee

  • C:\Users\Admin\AppData\Local\Temp\CCF9.tmp\start.bat

    Filesize

    80B

    MD5

    d3e1968f1feff01c334eb0ae4943662c

    SHA1

    9161e9ab4d4ceadb1667890b884742db96db6541

    SHA256

    500f6b19bd4c892f5cb4502975e5287b49170eaf84948bc5153b747b30773de3

    SHA512

    5992099816fd7b6e8bb5bcb3af321301aa9dbc3936a00704384dc0009a92957b10d07aaf853e581864776777c3ceca00e20e2cfe34902c637cacefd98b1c8f1a

  • memory/3636-153-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/3636-152-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/3636-150-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/4104-143-0x0000000005510000-0x0000000005AB4000-memory.dmp

    Filesize

    5.6MB

  • memory/4104-144-0x0000000005AC0000-0x0000000005B52000-memory.dmp

    Filesize

    584KB

  • memory/4104-145-0x0000000005E20000-0x0000000005E2A000-memory.dmp

    Filesize

    40KB

  • memory/4104-142-0x0000000000400000-0x00000000006FA000-memory.dmp

    Filesize

    3.0MB

  • memory/4104-140-0x0000000000400000-0x00000000006FA000-memory.dmp

    Filesize

    3.0MB

  • memory/4104-139-0x0000000000400000-0x00000000006FA000-memory.dmp

    Filesize

    3.0MB

  • memory/4148-148-0x00000000005D0000-0x00000000005D5000-memory.dmp

    Filesize

    20KB