Analysis

  • max time kernel
    87s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 06:39

General

  • Target

    cf31a2e4f481ea90d2d2a71711390ab5261b4702b3f9d2eb74e3ebf9eb2f4a77.exe

  • Size

    47KB

  • MD5

    609d5056b3945c70c89004f952fd404e

  • SHA1

    36a98623c3fab6e1d9026b3a466214a2eab9327a

  • SHA256

    cf31a2e4f481ea90d2d2a71711390ab5261b4702b3f9d2eb74e3ebf9eb2f4a77

  • SHA512

    63fb8a5576002815d9e629b1fd21e4e1fd821c5240504e6e4dac1de93583473ac202c0ebe473f9be3de8b0a285db35597672d4c7adc58c1ed9345f2168e42e61

  • SSDEEP

    768:Dh3s6PjF/+JltqpQRgeqU7UTh9PjpHJuKmrZgcwqSYk63h8OWZYbM7UlL27llFww:DpQqpQRPbUXPdHErZp45vOkwwURiFnqm

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf31a2e4f481ea90d2d2a71711390ab5261b4702b3f9d2eb74e3ebf9eb2f4a77.exe
    "C:\Users\Admin\AppData\Local\Temp\cf31a2e4f481ea90d2d2a71711390ab5261b4702b3f9d2eb74e3ebf9eb2f4a77.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3276
    • C:\Windows\SysWOW64\wintsvcc.exe
      "C:\Windows\system32\wintsvcc.exe" /no_ads
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4972

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\wintsvcc.exe

          Filesize

          51KB

          MD5

          b96be71407d1d359724cc304ae84dded

          SHA1

          4e1c514143c269ac2fa20b63496cd9f63b5c5780

          SHA256

          65ed54cfff87743a5cd42dcfac31be6e49f9b5688c7b92d83ef73198de387825

          SHA512

          1aabc911f10a8da2fbd861c022bb08f4231ee65e940738e6d44dd34a79f52f04b1dea814db202a5442bf0b58799039fe6cfe585c7409f4130f2bc85878407ad6

        • C:\Windows\SysWOW64\wintsvcc.exe

          Filesize

          51KB

          MD5

          b96be71407d1d359724cc304ae84dded

          SHA1

          4e1c514143c269ac2fa20b63496cd9f63b5c5780

          SHA256

          65ed54cfff87743a5cd42dcfac31be6e49f9b5688c7b92d83ef73198de387825

          SHA512

          1aabc911f10a8da2fbd861c022bb08f4231ee65e940738e6d44dd34a79f52f04b1dea814db202a5442bf0b58799039fe6cfe585c7409f4130f2bc85878407ad6

        • memory/3276-132-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/3276-137-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/4972-136-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB