Analysis

  • max time kernel
    146s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 16:39

General

  • Target

    cfd8ed4f2f59ef6f5bae63720191786cb48b565b99a43e41c6fd90e259e0257a.exe

  • Size

    93KB

  • MD5

    6c3e63a1d2ca5ee358fca8e9d558fb3f

  • SHA1

    5efccb5c8e63df825942d86085753e258103b69c

  • SHA256

    cfd8ed4f2f59ef6f5bae63720191786cb48b565b99a43e41c6fd90e259e0257a

  • SHA512

    e4acf8ac05dc1c4364d48eb9dddb706c4bb9e143a9597e805d6a2987f28060809e383a395db941222516dc4af180da12686af2644fdfb19554922598c00f56ec

  • SSDEEP

    1536:W7WU3gcb7dTQzuV2LSUdY4fl5rOruOhgOP9nqTIqslLTfx/h07ad/6QtRVLR/rg7:W7WyRVQ6UrXlYCO6OPpqTk/Z60y0f/rc

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfd8ed4f2f59ef6f5bae63720191786cb48b565b99a43e41c6fd90e259e0257a.exe
    "C:\Users\Admin\AppData\Local\Temp\cfd8ed4f2f59ef6f5bae63720191786cb48b565b99a43e41c6fd90e259e0257a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Mfp..bat" > nul 2> nul
      2⤵
        PID:2200

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Mfp..bat

      Filesize

      274B

      MD5

      c7f51a0034cfa9f3e045142617a855fe

      SHA1

      899567850b250e832065cb8fcbf7e30c491d638a

      SHA256

      1a935006708bacda954374331965d515d8ece7bbfe9e6c87582eb0f40270e569

      SHA512

      4c28b9fb7c03c1c52da7f78f25012adfe130a0354ee40f357b0376796c2161b1f608bad2061734584aae7a46de67a6bac6b1499a933fefe674d56dabab4423ee

    • memory/1744-132-0x0000000002170000-0x0000000002182000-memory.dmp

      Filesize

      72KB

    • memory/1744-133-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1744-134-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1744-136-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB