Analysis

  • max time kernel
    121s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 14:19

General

  • Target

    bd20a38cf4b3c160d6a9196600d5537985c615e365190da99d4f2ec6788e48f7.exe

  • Size

    36KB

  • MD5

    933b4213300a7a93c317954b09f4e17e

  • SHA1

    2aa38c56e92a99345251f71cf470ef5f4938def9

  • SHA256

    bd20a38cf4b3c160d6a9196600d5537985c615e365190da99d4f2ec6788e48f7

  • SHA512

    5742c6f366e12b4a9c2f244b62709abaf2b8ebd8ed3b3334faba75fa4631257cf42bd4a514c3ff0f2e19dd6a0eeba70d8a677c471d166d1a4d9dd7091836a624

  • SSDEEP

    768:GRcetMCMx3EY9KP5mP3KASn6kSEB3bNzIkLyrSG7Q:hicPEhmPn85NDLyrx7Q

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 51 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd20a38cf4b3c160d6a9196600d5537985c615e365190da99d4f2ec6788e48f7.exe
    "C:\Users\Admin\AppData\Local\Temp\bd20a38cf4b3c160d6a9196600d5537985c615e365190da99d4f2ec6788e48f7.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4104
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /u /s CPV6.dll
      2⤵
        PID:4436
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /s CPV7.dll
        2⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies registry class
        PID:4308

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\CPV\CPV7.dll

            Filesize

            50KB

            MD5

            58bb18142ea3738a44e2720224b3ed7a

            SHA1

            46bf897609e472bbdc61bda2a0a619c2019ea4c4

            SHA256

            3255bc73fdeb71c116514d34e89f1e1af8387f36f1c0413531b23b61a9193fcf

            SHA512

            10f32dbfd8664972ea1c493440a23d25cd1eca3910d93fa3c2764f69e0c2856f4307dda22c4f322c250844a1a0c43ddd3709e58dafba3d1e663b25d9b220a5f6

          • C:\Program Files (x86)\CPV\CPV7.dll

            Filesize

            50KB

            MD5

            58bb18142ea3738a44e2720224b3ed7a

            SHA1

            46bf897609e472bbdc61bda2a0a619c2019ea4c4

            SHA256

            3255bc73fdeb71c116514d34e89f1e1af8387f36f1c0413531b23b61a9193fcf

            SHA512

            10f32dbfd8664972ea1c493440a23d25cd1eca3910d93fa3c2764f69e0c2856f4307dda22c4f322c250844a1a0c43ddd3709e58dafba3d1e663b25d9b220a5f6