Analysis

  • max time kernel
    166s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 18:13

General

  • Target

    579198e11dce9be9f8f6da51e658581b64ca524e2e8aa589b07f030bafba869d.exe

  • Size

    115KB

  • MD5

    113a87c7f84a5fee0ff72fb57fd70d26

  • SHA1

    7cc2aa39089abce165331851bee9f8a5b7a82e07

  • SHA256

    579198e11dce9be9f8f6da51e658581b64ca524e2e8aa589b07f030bafba869d

  • SHA512

    0c7afed36b7c937a6361ab59ca0f431c963a5f8a2c57ae7332f2ffd639d8290c2941a3e838a859a7b7df6b1e611269017e5cac00a75d8525e1d4bbff65c50e6a

  • SSDEEP

    3072:YmpEp9xUWu1gGjXr2vwvEbMps2i/XHCoH:YmpPTj7QIpsPV

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\579198e11dce9be9f8f6da51e658581b64ca524e2e8aa589b07f030bafba869d.exe
    "C:\Users\Admin\AppData\Local\Temp\579198e11dce9be9f8f6da51e658581b64ca524e2e8aa589b07f030bafba869d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Lsz..bat" > nul 2> nul
      2⤵
        PID:212

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Lsz..bat

            Filesize

            274B

            MD5

            4e8104650281c819f6ccee80789fd191

            SHA1

            066375b5f7e718f44cab183b016e8e6bea1771f8

            SHA256

            2f130a32f4e7c9bdc79f6559c0a77820fe2cf624ca3606b148fd88df3971867b

            SHA512

            253ac7aecbc737d892ffc83dd7f80fca78a8c81aed1ff57c39cf5facacc7aa70545ee87d71e722916fab616ce92d4d590e180da145dbdba79c55ef1115d788b2

          • memory/4860-132-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/4860-133-0x0000000000401000-0x0000000000408000-memory.dmp

            Filesize

            28KB

          • memory/4860-134-0x0000000000BB0000-0x0000000000BC8000-memory.dmp

            Filesize

            96KB

          • memory/4860-135-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/4860-136-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/4860-138-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB