Analysis

  • max time kernel
    1789s
  • max time network
    1800s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    28-06-2022 17:31

General

  • Target

    2c3f5eb50a19e3f5f4b2d2b8bb36c72c3ac5950424050b36186693923fd2a831.exe

  • Size

    92KB

  • MD5

    5d4388bb58159eab12e3a34becd243b1

  • SHA1

    e670fbd000de5ab0785e1dc8e6b8456c5e1847c6

  • SHA256

    2c3f5eb50a19e3f5f4b2d2b8bb36c72c3ac5950424050b36186693923fd2a831

  • SHA512

    12a17e6b44c5386da41993f3b542dcada48359e5ca8a06bc65e407698bfa17ccecb26bfd5f002e300eddcc6f9e589b6a7d3c9dc6cfde6e26d51a90c84c4bb8a8

Score
10/10

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c3f5eb50a19e3f5f4b2d2b8bb36c72c3ac5950424050b36186693923fd2a831.exe
    "C:\Users\Admin\AppData\Local\Temp\2c3f5eb50a19e3f5f4b2d2b8bb36c72c3ac5950424050b36186693923fd2a831.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      C:\Users\Admin\AppData\Local\Temp\svchost.exe
      2⤵
      • Executes dropped EXE
      PID:1112

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    93KB

    MD5

    4e4a8812b80c8542a3095a53c29f5441

    SHA1

    6218bd4eba6d91007d8b8c32a040194ec123f5b6

    SHA256

    2cbf3ac4f304fa711e23d6a8a762451b7b06550d56b7bd688d4c6d1bee9984db

    SHA512

    5bfd0bb53db5e4c6abe8dbed61a14244e107061bd29319a30e6dc8ee1c87f9d88ead7c843494a0b927d32efbf95e9510eb4d67df6bc3f4c849c80798523a071b

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    93KB

    MD5

    4e4a8812b80c8542a3095a53c29f5441

    SHA1

    6218bd4eba6d91007d8b8c32a040194ec123f5b6

    SHA256

    2cbf3ac4f304fa711e23d6a8a762451b7b06550d56b7bd688d4c6d1bee9984db

    SHA512

    5bfd0bb53db5e4c6abe8dbed61a14244e107061bd29319a30e6dc8ee1c87f9d88ead7c843494a0b927d32efbf95e9510eb4d67df6bc3f4c849c80798523a071b

  • memory/1112-131-0x0000000000000000-mapping.dmp

  • memory/4844-130-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4844-133-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB