Analysis

  • max time kernel
    82s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 00:46

General

  • Target

    aba96ef4c1eff287485d1267211fdcccbd345cd221b8df9b02a5a31212873c84.exe

  • Size

    1.9MB

  • MD5

    8fcb6c71b701108f369a9d5e0f04019c

  • SHA1

    589f090b1794dc04b5da625d022f391d508bf147

  • SHA256

    aba96ef4c1eff287485d1267211fdcccbd345cd221b8df9b02a5a31212873c84

  • SHA512

    5926d40a844935efa265dc9c2e75566f4ddd6af8da92923b2fbc26397e3c71703ad090824021e0ab115f53916e7f5b9bb0a3ea8cf3c0d58ddc8c7d3f88d3cfa8

  • SSDEEP

    49152:tLIY9OVlrSAupNfpOQb656SrP0rgq0VRGvryBDbauAJECeJ/:tdOV5SvLfpOuhSQcUDU/gJECeJ/

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aba96ef4c1eff287485d1267211fdcccbd345cd221b8df9b02a5a31212873c84.exe
    "C:\Users\Admin\AppData\Local\Temp\aba96ef4c1eff287485d1267211fdcccbd345cd221b8df9b02a5a31212873c84.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Users\Admin\AppData\Local\Temp\111.exe
      "C:\Users\Admin\AppData\Local\Temp\111.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Users\Admin\AppData\Local\Temp\111.exe
        "C:\Users\Admin\AppData\Local\Temp\111.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1296
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 900
          4⤵
          • Program crash
          PID:4572
    • C:\Users\Admin\AppData\Local\Temp\NetPachisi.exe
      "C:\Users\Admin\AppData\Local\Temp\NetPachisi.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1012
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1296 -ip 1296
    1⤵
      PID:2364

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\111.exe

      Filesize

      1.2MB

      MD5

      793868e7f3fd47ecb67638e2d764f600

      SHA1

      01489ffb5977c0b547f9020468b921828c7a1e1e

      SHA256

      315ac8e4b38bebb20f89d3cfbe52449f23653d5c0dffcd1fc76ad973c6724089

      SHA512

      33721d9c56d7f0f37fc1d443474c59921d5c50813e9b3341d6ecd3140b2d1f8a74db54a280aed475fbd8b27cb45f6de0301fbd9fcb7d9a5618fcf299951c0a01

    • C:\Users\Admin\AppData\Local\Temp\111.exe

      Filesize

      1.2MB

      MD5

      793868e7f3fd47ecb67638e2d764f600

      SHA1

      01489ffb5977c0b547f9020468b921828c7a1e1e

      SHA256

      315ac8e4b38bebb20f89d3cfbe52449f23653d5c0dffcd1fc76ad973c6724089

      SHA512

      33721d9c56d7f0f37fc1d443474c59921d5c50813e9b3341d6ecd3140b2d1f8a74db54a280aed475fbd8b27cb45f6de0301fbd9fcb7d9a5618fcf299951c0a01

    • C:\Users\Admin\AppData\Local\Temp\111.exe

      Filesize

      1.2MB

      MD5

      793868e7f3fd47ecb67638e2d764f600

      SHA1

      01489ffb5977c0b547f9020468b921828c7a1e1e

      SHA256

      315ac8e4b38bebb20f89d3cfbe52449f23653d5c0dffcd1fc76ad973c6724089

      SHA512

      33721d9c56d7f0f37fc1d443474c59921d5c50813e9b3341d6ecd3140b2d1f8a74db54a280aed475fbd8b27cb45f6de0301fbd9fcb7d9a5618fcf299951c0a01

    • C:\Users\Admin\AppData\Local\Temp\NetPachisi.exe

      Filesize

      952KB

      MD5

      9f82f07d412d2749b03c5ce5c4bc5308

      SHA1

      8be350216219b1648d4c9ba2a19512e788a2383f

      SHA256

      c15d64ecb52fb9abcbef7a1870ab2d4dbbc3b01bfa2f54d5c141b7c6c7ca1937

      SHA512

      28c5411ea018cdfc911cd5c33a0552e5a5530d8bd51e1360eba2d7cf5e4d249e668ccf4012f6469e57c07ea445257cc595db1c1eda803b2cc5a6b4aa65d78285

    • C:\Users\Admin\AppData\Local\Temp\NetPachisi.exe

      Filesize

      952KB

      MD5

      9f82f07d412d2749b03c5ce5c4bc5308

      SHA1

      8be350216219b1648d4c9ba2a19512e788a2383f

      SHA256

      c15d64ecb52fb9abcbef7a1870ab2d4dbbc3b01bfa2f54d5c141b7c6c7ca1937

      SHA512

      28c5411ea018cdfc911cd5c33a0552e5a5530d8bd51e1360eba2d7cf5e4d249e668ccf4012f6469e57c07ea445257cc595db1c1eda803b2cc5a6b4aa65d78285

    • memory/1012-136-0x0000000000000000-mapping.dmp

    • memory/1296-150-0x0000000000400000-0x00000000004A4000-memory.dmp

      Filesize

      656KB

    • memory/1296-156-0x0000000000401000-0x0000000000402000-memory.dmp

      Filesize

      4KB

    • memory/1296-160-0x000000000040B000-0x000000000040C000-memory.dmp

      Filesize

      4KB

    • memory/1296-145-0x00000000005C0000-0x0000000000609000-memory.dmp

      Filesize

      292KB

    • memory/1296-158-0x0000000000402000-0x0000000000403000-memory.dmp

      Filesize

      4KB

    • memory/1296-151-0x00000000005C1000-0x00000000005F0000-memory.dmp

      Filesize

      188KB

    • memory/1296-152-0x0000000000400000-0x00000000004A4000-memory.dmp

      Filesize

      656KB

    • memory/1296-153-0x0000000000401000-0x000000000040D000-memory.dmp

      Filesize

      48KB

    • memory/1296-154-0x0000000000400000-0x00000000004A4000-memory.dmp

      Filesize

      656KB

    • memory/1296-155-0x0000000000400000-0x00000000004A4000-memory.dmp

      Filesize

      656KB

    • memory/1296-142-0x0000000000000000-mapping.dmp

    • memory/1748-132-0x0000000000000000-mapping.dmp

    • memory/1748-135-0x0000000000400000-0x00000000004A4000-memory.dmp

      Filesize

      656KB

    • memory/1748-161-0x0000000000400000-0x00000000004A4000-memory.dmp

      Filesize

      656KB