Analysis

  • max time kernel
    164s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 22:54

General

  • Target

    3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe

  • Size

    597KB

  • MD5

    643b50bdb6dbabde1748c43b70114960

  • SHA1

    e2a2ff8e5c29bee5baef325b56406184645b6d7a

  • SHA256

    3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012

  • SHA512

    7038df6130efc46a11c969972fab828a9e9df45788495adcdd9bed2a1126355fa9df765988cb4bcb7d5857820b8304b59e42d158fafb1b7085bac868a9fa1976

  • SSDEEP

    6144:dcJkl8DV12C28tLN2/FpCOLIYGAloERzlu7wZBuE2TRXOwAC8pE:d5GL2C2aZ2/FgQTL/Rzlu7PRQo

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe
    "C:\Users\Admin\AppData\Local\Temp\3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Users\Admin\AppData\Local\Temp\dujya.exe
      "C:\Users\Admin\AppData\Local\Temp\dujya.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4140
      • C:\Users\Admin\AppData\Local\Temp\nymoi.exe
        "C:\Users\Admin\AppData\Local\Temp\nymoi.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:640
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
        PID:2008

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

      Filesize

      340B

      MD5

      bba98b09621d2cc1ea5200dfecd1c25b

      SHA1

      49f257453e715e00d1113f729d6af4cf6111725d

      SHA256

      84cdeed7d32e540f20d7b7da904fc9855cc9b865ebcc6ccb38ac1867e073113e

      SHA512

      9ad799dd2a3848c1d2850c406cb939f0c09cf0e5faa7fd16de7f7b7839596c05982fb0936dba983acbc6e5410fc8ef0d43daca38d55fb5c2bf65e8f98b62f2ce

    • C:\Users\Admin\AppData\Local\Temp\dujya.exe

      Filesize

      597KB

      MD5

      17e3e7f92a578b7977e43d399f23aa8b

      SHA1

      dfc1f78672b9033ae478d45421ed285434bdbd76

      SHA256

      6c398c757dd1cfee87b44d1c16704a67ce9c35bf0d04bbe5a64e62476eaff2c7

      SHA512

      f66a51ec35fed9093dca7a234375b35b5dd7709c1738b6b5e91189cc77707b87ce6dfaaefe58297107e6c791e67eac44155196bac62950315a0a3a3eef1b9957

    • C:\Users\Admin\AppData\Local\Temp\dujya.exe

      Filesize

      597KB

      MD5

      17e3e7f92a578b7977e43d399f23aa8b

      SHA1

      dfc1f78672b9033ae478d45421ed285434bdbd76

      SHA256

      6c398c757dd1cfee87b44d1c16704a67ce9c35bf0d04bbe5a64e62476eaff2c7

      SHA512

      f66a51ec35fed9093dca7a234375b35b5dd7709c1738b6b5e91189cc77707b87ce6dfaaefe58297107e6c791e67eac44155196bac62950315a0a3a3eef1b9957

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      63d707df01d361203bace33f0d37feb1

      SHA1

      1680d7b5f8c71c8d920be5bebd02347df2da96f7

      SHA256

      82536ef100aa29576dadb044b2f502dd709c28de621c51131b0c75c8a7fc3652

      SHA512

      2bb8d8b9d0e58bf61436d3ddbb66d20776945b0220ba2cbe0a6ba6fdad000bb5c87d24eb2bd5b386c68e9fa7359ce9e61e1132b070ee394bc6875795fd80ce02

    • C:\Users\Admin\AppData\Local\Temp\nymoi.exe

      Filesize

      166KB

      MD5

      44dccf6069ccecc380b489343aec19f6

      SHA1

      a6c0e84c308f6ce7125577c3d6aef9dae6b552b0

      SHA256

      2415ee9ba8d82af9ba68f436b46df03ff80bb0187a6822f682b4047f9e8a8bbc

      SHA512

      8b790f117aa067ec6f14317c940f27986efcedf8ea653e879c5df7521cbc8fbc6f6d8f9854b4551f8117f4a27aee2feeed164ad3ef891edcf5f2fa3ff7f9c302

    • C:\Users\Admin\AppData\Local\Temp\nymoi.exe

      Filesize

      166KB

      MD5

      44dccf6069ccecc380b489343aec19f6

      SHA1

      a6c0e84c308f6ce7125577c3d6aef9dae6b552b0

      SHA256

      2415ee9ba8d82af9ba68f436b46df03ff80bb0187a6822f682b4047f9e8a8bbc

      SHA512

      8b790f117aa067ec6f14317c940f27986efcedf8ea653e879c5df7521cbc8fbc6f6d8f9854b4551f8117f4a27aee2feeed164ad3ef891edcf5f2fa3ff7f9c302

    • memory/640-146-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/640-149-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/4140-137-0x0000000000400000-0x0000000000495000-memory.dmp

      Filesize

      596KB

    • memory/4140-141-0x0000000000400000-0x0000000000495000-memory.dmp

      Filesize

      596KB

    • memory/4140-145-0x0000000000400000-0x0000000000495000-memory.dmp

      Filesize

      596KB

    • memory/4800-138-0x0000000000400000-0x0000000000495000-memory.dmp

      Filesize

      596KB

    • memory/4800-132-0x0000000000400000-0x0000000000495000-memory.dmp

      Filesize

      596KB