Analysis

  • max time kernel
    87s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 08:56

General

  • Target

    48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4.exe

  • Size

    64KB

  • MD5

    a255bc638ae574435d28ca5739e2a759

  • SHA1

    c386ff981a870a5464e81b1f62c4cd18816ba822

  • SHA256

    48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4

  • SHA512

    111cc4ccf41139501d914b38ce51581e68c9d99b957401277aba975aa975ef96e23d00238a26dc2b3797690a9ceba24cc58664eba80f0dbc542305e6f5ddd0bd

  • SSDEEP

    1536:xET64WKch3dQzOwtwSI3yHBUJu5OXIvzpjIp/3:xq64Wx3dmqSSyHBknGzpjA/3

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4.exe
    "C:\Users\Admin\AppData\Local\Temp\48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Omz..bat" > nul 2> nul
      2⤵
        PID:220

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Omz..bat

      Filesize

      274B

      MD5

      2312ddbe1fb88406271323323846ee05

      SHA1

      e9401330a8c317de6f32e9aa6ae9ad09a3ba172d

      SHA256

      b78a0ab52c8b77bef9ac0b931d6aae9dbb1cbf640c740eacb42eb99623f1bcf7

      SHA512

      ab874ca00c8acfd1408927c3f0ad399ce9b41b4c0756c933f630ef0db391db6e75e0fb3f020a518bacf8ae991fda3c01a6232e7bb5acb18e0372d495a1cdc855

    • memory/220-135-0x0000000000000000-mapping.dmp

    • memory/4684-132-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4684-133-0x00000000021E0000-0x00000000021F8000-memory.dmp

      Filesize

      96KB

    • memory/4684-134-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB