Analysis

  • max time kernel
    161s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 13:49

General

  • Target

    73e92da6c71a04784a80a0415b4f85eb739e1d36f9978b5bb78ec7bf951038a6.exe

  • Size

    883KB

  • MD5

    2b24b08789ff8a55624bfbadddd24ad1

  • SHA1

    80c61f3961fd54d28db7a44d92715a4bac3dd83d

  • SHA256

    73e92da6c71a04784a80a0415b4f85eb739e1d36f9978b5bb78ec7bf951038a6

  • SHA512

    479b4f74a4d3e76759f394c2ee9fce2f0de4c33ef84bfa6f07d61ca735b015e1c10d2842c3bbc743cd585bf0cebed3cb4b12c8a7683fb0328e92b01f76661ca6

  • SSDEEP

    24576:4ynccYTstXyiHwtB1H6ti/PNJ4piHwtB1H6ti/PNJ4C:4yrPyiHwei/PApiHwei/PAC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73e92da6c71a04784a80a0415b4f85eb739e1d36f9978b5bb78ec7bf951038a6.exe
    "C:\Users\Admin\AppData\Local\Temp\73e92da6c71a04784a80a0415b4f85eb739e1d36f9978b5bb78ec7bf951038a6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\73e92da6c71a04784a80a0415b4f85eb739e1d36f9978b5bb78ec7bf951038a6.exe
      C:\Users\Admin\AppData\Local\Temp\73e92da6c71a04784a80a0415b4f85eb739e1d36f9978b5bb78ec7bf951038a6.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:4900
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C START "" "C:\Users\Admin\AppData\Local\Temp\\2009_9_29_0.31.23.jpg"
      2⤵
        PID:2200

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4900-135-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/4900-139-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/4900-141-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB