Analysis

  • max time kernel
    91s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    09-06-2022 14:12

General

  • Target

    7zS8A52FD1B/62a1ea23da745_6e68c9a.exe

  • Size

    312KB

  • MD5

    0cad21764fe956f3028096ff3ff37549

  • SHA1

    09ceb67ca8d995e8811e6f0d13f7b01377f7f8c5

  • SHA256

    f65a68dcc63bd141e3a6619ed81b9c0ff3a5492ebd73034f8c794681f1875e3e

  • SHA512

    4733ea55c8aa918cd7dc35bfb97f5b9f59653244bae98caa3b9d4c7c60f8d7d249e8c20b191345923aa0db60137a0a04b8b20f589bef164076e2f8ec89529542

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea23da745_6e68c9a.exe
    "C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea23da745_6e68c9a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea23da745_6e68c9a.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea23da745_6e68c9a.exe" help
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:3280
  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:3732
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global
      2⤵
      • Loads dropped DLL
      PID:1460
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 600
        3⤵
        • Program crash
        PID:4512
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1460 -ip 1460
    1⤵
      PID:3452

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\db.dat
      Filesize

      557KB

      MD5

      215e381e9a16deb017b550e8a2480760

      SHA1

      56f4a18a314b001d2d1408e5825ed6bdf89b9f45

      SHA256

      6131812d6cdf3460443e46b4b348cb57e14c295c14fd78d7b994f9b790bfc491

      SHA512

      d1e7299b26928e8ebb08cc9d050bde2577c3f3170cfacf842e9fdabbe23c941e20445451860dbdbdc468a348b068a08447f193f7b2865140bf48920ae461197b

    • C:\Users\Admin\AppData\Local\Temp\db.dll
      Filesize

      52KB

      MD5

      7ffef7319bb7963fa71d05c0b3026f02

      SHA1

      e1f2ef0b151923e4312d5e958ff438beb6ba1d5b

      SHA256

      4f17ad05d7ed000195571c44a080d188f2309b92773fab60ca4e569864fa6fa4

      SHA512

      dea9e5627032ed95d34baa6677e64b3b8ffd12e512aee7b2db9ee6509357ec74366eb005379a327cb600a6c597479d7e48102b4c60bc57ba54b612ece30d3ed2

    • C:\Users\Admin\AppData\Local\Temp\db.dll
      Filesize

      52KB

      MD5

      7ffef7319bb7963fa71d05c0b3026f02

      SHA1

      e1f2ef0b151923e4312d5e958ff438beb6ba1d5b

      SHA256

      4f17ad05d7ed000195571c44a080d188f2309b92773fab60ca4e569864fa6fa4

      SHA512

      dea9e5627032ed95d34baa6677e64b3b8ffd12e512aee7b2db9ee6509357ec74366eb005379a327cb600a6c597479d7e48102b4c60bc57ba54b612ece30d3ed2

    • memory/1460-132-0x0000000000000000-mapping.dmp
    • memory/3280-130-0x0000000000000000-mapping.dmp