Analysis

  • max time kernel
    133s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 11:50

General

  • Target

    8189220186f32a4decbdef7f06ab3dc88913a267abe83f86ef754a11df0fadf9.exe

  • Size

    106KB

  • MD5

    bbe9f42ac648931f92b2e906e9248eff

  • SHA1

    7d292d51202a4ce782a0f2231bbff17f727b2d22

  • SHA256

    8189220186f32a4decbdef7f06ab3dc88913a267abe83f86ef754a11df0fadf9

  • SHA512

    66f736ec5028d94ad72723fa82d405aec3a5813f5852221ce0834b108dd2377f505b03678a8ede5e7aea95ee6e8528d59d2d5410acccf0681df25f7a345b5648

  • SSDEEP

    1536:PoHPsTF8QWlJkSJVtqCvOmpR58V8rsKTqECtOBUFQX1n/WYG7V4mb:tWVqiS8rsKmD+UFktG7V4

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8189220186f32a4decbdef7f06ab3dc88913a267abe83f86ef754a11df0fadf9.exe
    "C:\Users\Admin\AppData\Local\Temp\8189220186f32a4decbdef7f06ab3dc88913a267abe83f86ef754a11df0fadf9.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4352
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ctj..bat" > nul 2> nul
      2⤵
        PID:4416

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Ctj..bat

      Filesize

      274B

      MD5

      9323c1ccf5a9a3c6e924d660cb344602

      SHA1

      485bc62e8801421e2a54574e0fb6fae5a20fa8b7

      SHA256

      03df4e2af7419d8228bf2a8ee223074458a230711ad46ef8b603fcaebef6b628

      SHA512

      8849c0c3e91951c0e1b38591454e342cb36f8e29f25289e0a33f74b762a0f1b4d8195ac36055e722378978510841e095b53d653a748062dfc5aa98071ff69c1a

    • memory/4352-132-0x00000000001C0000-0x00000000001C8000-memory.dmp

      Filesize

      32KB

    • memory/4352-133-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4352-135-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4416-134-0x0000000000000000-mapping.dmp