Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-07-2022 05:36

General

  • Target

    6055e6134d3c861ef5b2e599dd87959debcc09e6855cf3c8e4d32b6255aa1f99.exe

  • Size

    179KB

  • MD5

    84f2b1ef959d96970c899e581905c333

  • SHA1

    57119042042e49e550c90a801c7ca15b8cf1b2ab

  • SHA256

    6055e6134d3c861ef5b2e599dd87959debcc09e6855cf3c8e4d32b6255aa1f99

  • SHA512

    c32903f151977a7fb624aa23639251976d10af864bd608f7a5b77ebde9cd178051529c1c0870f38a412f5e60ce97b499c20faeee2263ac70ce0ea7a675e51c29

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6055e6134d3c861ef5b2e599dd87959debcc09e6855cf3c8e4d32b6255aa1f99.exe
    "C:\Users\Admin\AppData\Local\Temp\6055e6134d3c861ef5b2e599dd87959debcc09e6855cf3c8e4d32b6255aa1f99.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Users\Admin\AppData\Roaming\ProgramFiles(32.3u)\svchost.exe
      "C:\Users\Admin\AppData\Roaming\ProgramFiles(32.3u)\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

    Filesize

    471B

    MD5

    c8e110d4f0fa3358d71e8759b61830f1

    SHA1

    82de544c2c0f7bf30fdf2044fb047106d7b094c3

    SHA256

    e3af569ed90c5283532bdc320551d1a5d674b989f38c9421855195fe0579fb5e

    SHA512

    0ea9babc2e63eceedc9ee5d404ff47908bf8c3b8983d822a670d31f78bbff489346d8375e437436fb044af5ce17232d4ce10f2a87f007dbb6415a3c7e7133601

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66AE3BFDF94A732B262342AD2154B86E_1504CB01E15745C324D88B59ACA8C10D

    Filesize

    490B

    MD5

    8877d510e3c8d5fab1679d40884da090

    SHA1

    1d6bb8277ec519f8d3337d3786e1e1b35f818b37

    SHA256

    d00400964ebdd17939571e41935916f1bc2a0943e7614b9bf0b4397e85238d39

    SHA512

    03a10cf8691043e78ff8bdfab682da4127f2216a8d557a35c7996caf6fea232d146b2c4150b2948c564903db5b723b7a67e999aafc3b14fdf910437b9c07c715

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

    Filesize

    434B

    MD5

    5cc644e29a5e69790527b4f658809cf8

    SHA1

    f0f0be714d95c9d9b569b16387d11dcdc63f4f79

    SHA256

    035de5f600186f9e926fa9e637c98d0fcc187ad5c12a0c2703c8614767a2c990

    SHA512

    6206c10ca532e41e2e5d224dea880a2dddc66aa8a0c10a0d6d2123f937bf2895fc06e7eaae20185091f2393c012edf8f52040106944ab2797dbf24717f165d4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66AE3BFDF94A732B262342AD2154B86E_1504CB01E15745C324D88B59ACA8C10D

    Filesize

    404B

    MD5

    dbc3cc82334d9c0d8cfd52ee0758f02f

    SHA1

    6140315c396f814edbc1bec4ae7b2423baf52b31

    SHA256

    4733101519fbdd49e4699fd26cd8800ff79cb1e0555c843f675da2922e1be5b7

    SHA512

    3e72b778f105302820ea660c04475e4190fd3d8bad474d2353ec21beb09ab095f101b8fed4b894d88ee88833ec5d209577c78f65fa1fc1f93af0df721885ebb8

  • C:\Users\Admin\AppData\Roaming\ProgramFiles(32.3u)\svchost.exe

    Filesize

    179KB

    MD5

    84f2b1ef959d96970c899e581905c333

    SHA1

    57119042042e49e550c90a801c7ca15b8cf1b2ab

    SHA256

    6055e6134d3c861ef5b2e599dd87959debcc09e6855cf3c8e4d32b6255aa1f99

    SHA512

    c32903f151977a7fb624aa23639251976d10af864bd608f7a5b77ebde9cd178051529c1c0870f38a412f5e60ce97b499c20faeee2263ac70ce0ea7a675e51c29

  • C:\Users\Admin\AppData\Roaming\ProgramFiles(32.3u)\svchost.exe

    Filesize

    179KB

    MD5

    84f2b1ef959d96970c899e581905c333

    SHA1

    57119042042e49e550c90a801c7ca15b8cf1b2ab

    SHA256

    6055e6134d3c861ef5b2e599dd87959debcc09e6855cf3c8e4d32b6255aa1f99

    SHA512

    c32903f151977a7fb624aa23639251976d10af864bd608f7a5b77ebde9cd178051529c1c0870f38a412f5e60ce97b499c20faeee2263ac70ce0ea7a675e51c29

  • memory/1612-138-0x00007FF9DD380000-0x00007FF9DDDB6000-memory.dmp

    Filesize

    10.2MB

  • memory/4588-130-0x00007FF9DD630000-0x00007FF9DE066000-memory.dmp

    Filesize

    10.2MB