Analysis

  • max time kernel
    164s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 10:14

General

  • Target

    e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe

  • Size

    17KB

  • MD5

    70bc7465bca83546f84e42f9b6609fe0

  • SHA1

    7d29645c17348a14c2b4367b375b61a29e25e52a

  • SHA256

    e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc

  • SHA512

    be34ef94796a2e1eef27ba48af40790f73d58aa999ed4a986f961ec7dad403593e25a31639e12b726b59bfdc100838e6cc73e7ca09972f9e3db0f8555e941213

  • SSDEEP

    384:224bhc6Q1NFMJ70QHgZlOADKni0nhftDZnxRq4BUC2UVQu:llLF070Q8IniQlDRzq6UC2Vu

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe
    "C:\Users\Admin\AppData\Local\Temp\e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\SysWOW64\ishost.exe
      C:\Windows\system32\ishost.exe
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3324
      • C:\Windows\SysWOW64\ismini.exe
        C:\Windows\system32\ismini.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:5044
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\E81584~1.EXE > nul
      2⤵
        PID:2136

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\ishost.exe

      Filesize

      33KB

      MD5

      0d953795d16d21afbef4eaeeb1e912bc

      SHA1

      50ec9290f4e96f1903b03e93dd471538ac0cee48

      SHA256

      7fd7167030f22a725f86f7a382d925ebb00d1281c4499f3e1de58758f8d7aa22

      SHA512

      71d7b0bd69299f5e264afd7110511d133cb56af0cd5dc12939be61dc74591cf367549a2de700a101acddd4f85aad389a5d20180dcb8b5fed129f8dd7bbf8e52b

    • C:\Windows\SysWOW64\ishost.exe

      Filesize

      33KB

      MD5

      0d953795d16d21afbef4eaeeb1e912bc

      SHA1

      50ec9290f4e96f1903b03e93dd471538ac0cee48

      SHA256

      7fd7167030f22a725f86f7a382d925ebb00d1281c4499f3e1de58758f8d7aa22

      SHA512

      71d7b0bd69299f5e264afd7110511d133cb56af0cd5dc12939be61dc74591cf367549a2de700a101acddd4f85aad389a5d20180dcb8b5fed129f8dd7bbf8e52b

    • C:\Windows\SysWOW64\ismini.exe

      Filesize

      4KB

      MD5

      1643c0c6446c19b0a4fa925953b23564

      SHA1

      e31991c436cdfca8937ca27c28d9bd9e830aa0bb

      SHA256

      649c2ad2d97bbe4a6017152aa8011673065000a12c2a32ff99b49cd857ae7885

      SHA512

      095da571869d8b85407dbce52ccff05e8dd058d6be8d33b0d0f6c36c7eb80fcfc58d96a749222b8766e84e3b41aeefa8be1c755ff040e79ca7834a3d16003527

    • C:\Windows\SysWOW64\ismini.exe

      Filesize

      4KB

      MD5

      1643c0c6446c19b0a4fa925953b23564

      SHA1

      e31991c436cdfca8937ca27c28d9bd9e830aa0bb

      SHA256

      649c2ad2d97bbe4a6017152aa8011673065000a12c2a32ff99b49cd857ae7885

      SHA512

      095da571869d8b85407dbce52ccff05e8dd058d6be8d33b0d0f6c36c7eb80fcfc58d96a749222b8766e84e3b41aeefa8be1c755ff040e79ca7834a3d16003527