Analysis

  • max time kernel
    93s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 07:43

General

  • Target

    ac120fa2467d9a3932f5a86bea24978f8713a4471a72bafb1719686f8f011729.exe

  • Size

    213KB

  • MD5

    6f83316fe200418a9f41da87e22130e0

  • SHA1

    7649b7984725a12ed9e5b58ef01069e53891ee34

  • SHA256

    ac120fa2467d9a3932f5a86bea24978f8713a4471a72bafb1719686f8f011729

  • SHA512

    90528a90cc61c8a97885ce9217b6723d5d66291a4aa5fdbf32e4d743d33b0f45fed1696387ba33802307a483a7da0004def93779a2cfd4e9a5683338bb27d738

  • SSDEEP

    6144:4u2urzh9xu/Xkau8w5ndxT3TK3pAF6p5Mk/5o/:4utrzh9xOXkXJdx323pAMp5MJ/

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac120fa2467d9a3932f5a86bea24978f8713a4471a72bafb1719686f8f011729.exe
    "C:\Users\Admin\AppData\Local\Temp\ac120fa2467d9a3932f5a86bea24978f8713a4471a72bafb1719686f8f011729.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Users\Admin\AppData\Local\Temp\ui32.exe
      "C:\Users\Admin\AppData\Local\Temp\ui32.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Users\Admin\AppData\Local\Temp\ui32.exe
        "C:\Users\Admin\AppData\Local\Temp\ui32.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        PID:4080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n402.dll

    Filesize

    27B

    MD5

    b33236ec368a53794beb8f44c4128f79

    SHA1

    3eac83232a5a5cd6f42551814aae6df92888b8b6

    SHA256

    e0f1d608da176665300fcf58467d6bddcbe19fa12600cc0fdbf2ee96b8ed7f37

    SHA512

    05dd97eefd9fe024cd5bc69bb173105d13de8794bcbfa8bc77d925e7e21435cebdbb77f9a8747eaef4a50dd7276ea48513ea5f26f787242ace4494ebec9683f4

  • C:\Users\Admin\AppData\Local\Temp\ui32.exe

    Filesize

    228KB

    MD5

    728c6f049387e93974a39b1b95ff72e7

    SHA1

    502b06ca3baa78a5455ae3f361d0a375e7f1b902

    SHA256

    468a7b9570cab75742ee59489ab1f2ddd861c1214f27524ad0eaecb9ee6b82c4

    SHA512

    e60eb0ae77384758c42ce128016cc615cbcc33cb71462c1749ad001f00ecdb2afbfa7807eba568700f9bb64bf4940d9354440576acfdb989f2b27371dc68d32c

  • C:\Users\Admin\AppData\Local\Temp\ui32.exe

    Filesize

    228KB

    MD5

    728c6f049387e93974a39b1b95ff72e7

    SHA1

    502b06ca3baa78a5455ae3f361d0a375e7f1b902

    SHA256

    468a7b9570cab75742ee59489ab1f2ddd861c1214f27524ad0eaecb9ee6b82c4

    SHA512

    e60eb0ae77384758c42ce128016cc615cbcc33cb71462c1749ad001f00ecdb2afbfa7807eba568700f9bb64bf4940d9354440576acfdb989f2b27371dc68d32c

  • C:\Users\Admin\AppData\Local\Temp\ui32.exe

    Filesize

    228KB

    MD5

    728c6f049387e93974a39b1b95ff72e7

    SHA1

    502b06ca3baa78a5455ae3f361d0a375e7f1b902

    SHA256

    468a7b9570cab75742ee59489ab1f2ddd861c1214f27524ad0eaecb9ee6b82c4

    SHA512

    e60eb0ae77384758c42ce128016cc615cbcc33cb71462c1749ad001f00ecdb2afbfa7807eba568700f9bb64bf4940d9354440576acfdb989f2b27371dc68d32c

  • memory/4080-138-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4080-140-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4080-141-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4080-142-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4080-144-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB