Analysis

  • max time kernel
    163s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 07:35

General

  • Target

    43b524df826935d6ce139a135cff3845a28582a6034b783eec973fa8ed441ac7.exe

  • Size

    67KB

  • MD5

    73cf3e155e484af5c81d0d6706ad297c

  • SHA1

    c5243611ec06746a91ef5de7b6b53c8b8146f582

  • SHA256

    43b524df826935d6ce139a135cff3845a28582a6034b783eec973fa8ed441ac7

  • SHA512

    588a6dce0c4b880eb745006e738d89452755e80882e1d6723a7173fd102295bb08abc0e3d02f5e6d2032da2e1a7dfb96d9675b1f02104091fe2bc057790f61aa

  • SSDEEP

    1536:2wetP10SuUdZuhRfUwvw37j/XrTnEmgIFlkFVtJ/K:2vc0ZupIrj/XzD4d/K

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43b524df826935d6ce139a135cff3845a28582a6034b783eec973fa8ed441ac7.exe
    "C:\Users\Admin\AppData\Local\Temp\43b524df826935d6ce139a135cff3845a28582a6034b783eec973fa8ed441ac7.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:4676
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ctp..bat" > nul 2> nul
      2⤵
        PID:4880

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Ctp..bat

      Filesize

      274B

      MD5

      9e1719b8237a833986f5198f389f87dc

      SHA1

      317808e9f88e011e08b2ba16b5ea94426c02bdbc

      SHA256

      e925ceb9e4347d8210d4003ac83bef31eef79a3a4fcd6377cc946468c394b026

      SHA512

      f10acece674a8a0cd90b797f09e07b859f3f3f7c9f1e869fc279591f39a99014032cd7803e42449b408c61d8e78fa8ae94a73b42f5b7e9343e65b6d6f9142dee

    • memory/4676-132-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4676-133-0x00000000020B0000-0x00000000020C2000-memory.dmp

      Filesize

      72KB

    • memory/4676-134-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4676-136-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB