Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 04:32

General

  • Target

    4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe

  • Size

    164KB

  • MD5

    ead30fb1cc8bf40ba3a64aac48d8113f

  • SHA1

    a9eeb4fc73e9bdc87402330f5a7426675004bbd4

  • SHA256

    4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449

  • SHA512

    41092adf253dfe3b7d456ecd501524c1b3a6fcf8d5e22a79a7d634659a0fa35235bdb620d0349b47e476be5950a044997ac7f9f23dca7674e7dde54701944985

  • SSDEEP

    3072:fG1TRtydMn84E4rmE6lBx8p6H++a3s4ElwJz/H2g9XmLGJvr1lZqHRVItGpDxL:fG1FVn84Vm+6+ElkuOXIGRrbZoVItM

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 12 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe
    "C:\Users\Admin\AppData\Local\Temp\4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:388
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"
      2⤵
      • Executes dropped EXE
      PID:1328
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"
      2⤵
      • Executes dropped EXE
      PID:3824
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"
      2⤵
      • Executes dropped EXE
      PID:3452
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"
      2⤵
      • Executes dropped EXE
      PID:2872
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"
      2⤵
      • Executes dropped EXE
      PID:3460
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\windows1.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3524
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net stop antivirService
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4088
        • C:\Windows\SysWOW64\net.exe
          net stop antivirService
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1756
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop antivirService
            5⤵
              PID:2028
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net stop windefend
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2992
          • C:\Windows\SysWOW64\net.exe
            net stop windefend
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4272
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop windefend
              5⤵
                PID:3748
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c net stop sp_rssrv
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3008
            • C:\Windows\SysWOW64\net.exe
              net stop sp_rssrv
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3972
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop sp_rssrv
                5⤵
                  PID:3148
          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"
            2⤵
            • Executes dropped EXE
            PID:4792
          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"
            2⤵
            • Executes dropped EXE
            PID:3396
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\windows3.bat" "
            2⤵
              PID:1180
            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe
              "C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"
              2⤵
              • Executes dropped EXE
              PID:3592
            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe
              "C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"
              2⤵
              • Executes dropped EXE
              PID:4276
            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Foto.exe
              "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Foto.exe"
              2⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Suspicious use of WriteProcessMemory
              PID:4772
              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                3⤵
                • Executes dropped EXE
                • Checks computer location settings
                • Adds Run key to start application
                PID:1892
                • C:\Users\Admin\AppData\Local\Temp\p1.exe
                  "C:\Users\Admin\AppData\Local\Temp\p1.exe"
                  4⤵
                  • Executes dropped EXE
                  PID:404

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Foto.exe

            Filesize

            95KB

            MD5

            27b18d0e70d372e955f23b4a87bd8f89

            SHA1

            c77837401147ea45ca7033290a22c306eeb5d4a0

            SHA256

            5a1a28f3b7aaa943038cea32551d7c0dc506c2d37c79e26c120e80bdb8a4bedb

            SHA512

            0dada74d1661c5b1ccbdbb13ecec253ab0753ac719728472b35c305710f381c0864a3e5bbabe184e6de52cc88d54fadb437e72ce769b5d7bfb0c2352f6c0e254

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Foto.exe

            Filesize

            95KB

            MD5

            27b18d0e70d372e955f23b4a87bd8f89

            SHA1

            c77837401147ea45ca7033290a22c306eeb5d4a0

            SHA256

            5a1a28f3b7aaa943038cea32551d7c0dc506c2d37c79e26c120e80bdb8a4bedb

            SHA512

            0dada74d1661c5b1ccbdbb13ecec253ab0753ac719728472b35c305710f381c0864a3e5bbabe184e6de52cc88d54fadb437e72ce769b5d7bfb0c2352f6c0e254

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\windows1.bat

            Filesize

            151B

            MD5

            e2e58527f7455f3a7c0853d73df5e3fe

            SHA1

            3b48ec55e55b0401d79d8a698571e069bfae462b

            SHA256

            3ab6d816e12ecc256c7cc98fb301dfe7ec74a01764f0f8f3591e2b035193ee0a

            SHA512

            e59a50f1ac5a5e92a736397a795e6d851a7ff988f0698bc90137aafec8db9b7d9a2db111b355db32204ce6d57cb902ee5bf8f90664e093b47a45f43186d66ca2

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\windows3.bat

            Filesize

            280B

            MD5

            2df377e552d0180ffbb0168c88ec51be

            SHA1

            52e604fe3b461de67030a6a55141548eb15cfaae

            SHA256

            b5c790d942740783f254d62fb6f4dea1e8182b535462f99f271892ceab114ac3

            SHA512

            5252917c984551c6270a062f6ed0df18094858f64728b45cb575fdc84a6ad10395f20ad64fc51dc83d9ce96bca5ea100eda60643a0c82d286f80a27e3606eaa6

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe

            Filesize

            2KB

            MD5

            763f02a065bd4a5d810445919434e292

            SHA1

            80806ac05ddb0f7796aebf5062ae13e2295dc728

            SHA256

            e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd

            SHA512

            3e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe

            Filesize

            2KB

            MD5

            763f02a065bd4a5d810445919434e292

            SHA1

            80806ac05ddb0f7796aebf5062ae13e2295dc728

            SHA256

            e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd

            SHA512

            3e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe

            Filesize

            2KB

            MD5

            763f02a065bd4a5d810445919434e292

            SHA1

            80806ac05ddb0f7796aebf5062ae13e2295dc728

            SHA256

            e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd

            SHA512

            3e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe

            Filesize

            2KB

            MD5

            763f02a065bd4a5d810445919434e292

            SHA1

            80806ac05ddb0f7796aebf5062ae13e2295dc728

            SHA256

            e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd

            SHA512

            3e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe

            Filesize

            2KB

            MD5

            763f02a065bd4a5d810445919434e292

            SHA1

            80806ac05ddb0f7796aebf5062ae13e2295dc728

            SHA256

            e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd

            SHA512

            3e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe

            Filesize

            2KB

            MD5

            763f02a065bd4a5d810445919434e292

            SHA1

            80806ac05ddb0f7796aebf5062ae13e2295dc728

            SHA256

            e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd

            SHA512

            3e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe

            Filesize

            2KB

            MD5

            763f02a065bd4a5d810445919434e292

            SHA1

            80806ac05ddb0f7796aebf5062ae13e2295dc728

            SHA256

            e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd

            SHA512

            3e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe

            Filesize

            2KB

            MD5

            763f02a065bd4a5d810445919434e292

            SHA1

            80806ac05ddb0f7796aebf5062ae13e2295dc728

            SHA256

            e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd

            SHA512

            3e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe

            Filesize

            2KB

            MD5

            763f02a065bd4a5d810445919434e292

            SHA1

            80806ac05ddb0f7796aebf5062ae13e2295dc728

            SHA256

            e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd

            SHA512

            3e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe

            Filesize

            2KB

            MD5

            763f02a065bd4a5d810445919434e292

            SHA1

            80806ac05ddb0f7796aebf5062ae13e2295dc728

            SHA256

            e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd

            SHA512

            3e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12

          • C:\Users\Admin\AppData\Local\Temp\p1.exe

            Filesize

            2KB

            MD5

            763f02a065bd4a5d810445919434e292

            SHA1

            80806ac05ddb0f7796aebf5062ae13e2295dc728

            SHA256

            e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd

            SHA512

            3e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12

          • C:\Users\Admin\AppData\Local\Temp\p1.exe

            Filesize

            2KB

            MD5

            763f02a065bd4a5d810445919434e292

            SHA1

            80806ac05ddb0f7796aebf5062ae13e2295dc728

            SHA256

            e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd

            SHA512

            3e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12

          • C:\Users\Admin\AppData\Local\Temp\svchost.exe

            Filesize

            71KB

            MD5

            e01fb44ef9aa08831c08d72cbd64049d

            SHA1

            b92b189790dc42f2903f0b81ba979ed638de97de

            SHA256

            d449441f97cb903bb30748e394bf50c26e3d2922477bfcfa2af65f313044968c

            SHA512

            fb3df413260533a285994ed2a39d2ff42c214e518902955f09460d6feaca310c4fe4e24e7ff87d2e344f156fbe8d8cb63edc105083b32d14fff025a53a5690e4

          • C:\Users\Admin\AppData\Local\Temp\svchost.exe

            Filesize

            71KB

            MD5

            e01fb44ef9aa08831c08d72cbd64049d

            SHA1

            b92b189790dc42f2903f0b81ba979ed638de97de

            SHA256

            d449441f97cb903bb30748e394bf50c26e3d2922477bfcfa2af65f313044968c

            SHA512

            fb3df413260533a285994ed2a39d2ff42c214e518902955f09460d6feaca310c4fe4e24e7ff87d2e344f156fbe8d8cb63edc105083b32d14fff025a53a5690e4

          • memory/1892-170-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB

          • memory/1892-174-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB