Analysis

  • max time kernel
    119s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 03:23

General

  • Target

    3a81cf5da9b70be10b5ee6d4bd488ddb768d9f63ca459963051dbc30bd4455db.exe

  • Size

    1.1MB

  • MD5

    885a6b438fe3c23b4d8d09c43034d173

  • SHA1

    e5993444aca13b4526a96e36e594dcc61a9022b1

  • SHA256

    3a81cf5da9b70be10b5ee6d4bd488ddb768d9f63ca459963051dbc30bd4455db

  • SHA512

    dd23455c1c1102af094cc7a8d2397359eeda0e609c94f435424c202615f8a002df34e8db89a0a6499138b0a4ad8733886e809fc444f9249acd976996b1e3644a

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a81cf5da9b70be10b5ee6d4bd488ddb768d9f63ca459963051dbc30bd4455db.exe
    "C:\Users\Admin\AppData\Local\Temp\3a81cf5da9b70be10b5ee6d4bd488ddb768d9f63ca459963051dbc30bd4455db.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4168
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" /c select, C:\Users\Admin\AppData\Roaming\vpn.exe
      2⤵
        PID:3012
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Users\Admin\AppData\Roaming\vpn.exe
        "C:\Users\Admin\AppData\Roaming\vpn.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4396
        • C:\Users\Admin\AppData\Roaming\vpn.exe
          "C:\Users\Admin\AppData\Roaming\vpn.exe"
          3⤵
          • Executes dropped EXE
          PID:3768

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\vpn.exe.log

      Filesize

      518B

      MD5

      6f7d75899d5427a4ada7a840a7a04d5c

      SHA1

      99eb2c39ba43c7e65dc798fe8b52c53de03816ea

      SHA256

      a027cb814313e8be32f1be8b9d39bb0ba03263c6fde02e6b8ee69e5b925db67e

      SHA512

      4ed2f02a9966ef1511399770fbfa2a06700fe184d365284d9031041bb641cf55717797c6935e8d192620961e49cca8ad24a96cc0af883ee9b7733940f5356a24

    • C:\Users\Admin\AppData\Roaming\vpn.exe

      Filesize

      1.1MB

      MD5

      885a6b438fe3c23b4d8d09c43034d173

      SHA1

      e5993444aca13b4526a96e36e594dcc61a9022b1

      SHA256

      3a81cf5da9b70be10b5ee6d4bd488ddb768d9f63ca459963051dbc30bd4455db

      SHA512

      dd23455c1c1102af094cc7a8d2397359eeda0e609c94f435424c202615f8a002df34e8db89a0a6499138b0a4ad8733886e809fc444f9249acd976996b1e3644a

    • C:\Users\Admin\AppData\Roaming\vpn.exe

      Filesize

      1.1MB

      MD5

      885a6b438fe3c23b4d8d09c43034d173

      SHA1

      e5993444aca13b4526a96e36e594dcc61a9022b1

      SHA256

      3a81cf5da9b70be10b5ee6d4bd488ddb768d9f63ca459963051dbc30bd4455db

      SHA512

      dd23455c1c1102af094cc7a8d2397359eeda0e609c94f435424c202615f8a002df34e8db89a0a6499138b0a4ad8733886e809fc444f9249acd976996b1e3644a

    • C:\Users\Admin\AppData\Roaming\vpn.exe

      Filesize

      1.1MB

      MD5

      885a6b438fe3c23b4d8d09c43034d173

      SHA1

      e5993444aca13b4526a96e36e594dcc61a9022b1

      SHA256

      3a81cf5da9b70be10b5ee6d4bd488ddb768d9f63ca459963051dbc30bd4455db

      SHA512

      dd23455c1c1102af094cc7a8d2397359eeda0e609c94f435424c202615f8a002df34e8db89a0a6499138b0a4ad8733886e809fc444f9249acd976996b1e3644a

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch

      Filesize

      514B

      MD5

      4c62b64d103651e6b6dd6803f9d040bd

      SHA1

      26002e6b44837bae7932cf7b7d6f33fb48995f55

      SHA256

      b10b15e3bc9f99490664958a9c908fc824ab7132f6b72972dc0ef685d33edf72

      SHA512

      ce6d71d9944ec43761113b6d03bfefcd5d26c0d22e044100a42666c734f22ed7589fc8871a127da931604861960348735d0a9a95450587c387a1357c9122f52d

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch

      Filesize

      514B

      MD5

      4c62b64d103651e6b6dd6803f9d040bd

      SHA1

      26002e6b44837bae7932cf7b7d6f33fb48995f55

      SHA256

      b10b15e3bc9f99490664958a9c908fc824ab7132f6b72972dc0ef685d33edf72

      SHA512

      ce6d71d9944ec43761113b6d03bfefcd5d26c0d22e044100a42666c734f22ed7589fc8871a127da931604861960348735d0a9a95450587c387a1357c9122f52d

    • memory/3012-132-0x0000000000000000-mapping.dmp

    • memory/3768-144-0x0000000073FC0000-0x0000000074571000-memory.dmp

      Filesize

      5.7MB

    • memory/3768-141-0x0000000000000000-mapping.dmp

    • memory/3768-146-0x0000000073FC0000-0x0000000074571000-memory.dmp

      Filesize

      5.7MB

    • memory/3768-148-0x0000000073FC0000-0x0000000074571000-memory.dmp

      Filesize

      5.7MB

    • memory/4168-130-0x0000000074C60000-0x0000000075211000-memory.dmp

      Filesize

      5.7MB

    • memory/4168-133-0x0000000074C60000-0x0000000075211000-memory.dmp

      Filesize

      5.7MB

    • memory/4168-131-0x0000000074C60000-0x0000000075211000-memory.dmp

      Filesize

      5.7MB

    • memory/4396-135-0x0000000000000000-mapping.dmp

    • memory/4396-139-0x0000000073FC0000-0x0000000074571000-memory.dmp

      Filesize

      5.7MB

    • memory/4396-140-0x0000000073FC0000-0x0000000074571000-memory.dmp

      Filesize

      5.7MB

    • memory/4396-145-0x0000000073FC0000-0x0000000074571000-memory.dmp

      Filesize

      5.7MB