Analysis

  • max time kernel
    131s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2022 06:47

General

  • Target

    tmp.exe

  • Size

    1.7MB

  • MD5

    32872588c27ca8605d978cbee2a5b015

  • SHA1

    745bd83e1ebed8917db8db327d7df0dae47c1c0d

  • SHA256

    93e0780f767832e16b70626a623384f69022fdc7cd8b4046bad18a5d58e24ff4

  • SHA512

    81cfcea80276ffd58a1ca035a719960b42c70901211625ea8b9f5d109815dc8bfc85b6b5f4e01d75efed3a410d289212c18e28b0850cf4eb72e3317d5d5e3753

  • SSDEEP

    49152:0AgP22Qgnp1/kgChYku1rZeDsP4KiIxXxQ:0dP2W1/kaPnxQ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Checks computer location settings
    PID:1088

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads