Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 10:32

General

  • Target

    559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3.exe

  • Size

    130KB

  • MD5

    5993ad35ac7c878a70231b77957fedba

  • SHA1

    2f09acd7fd36a207731c4415d02c864479afacc3

  • SHA256

    559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3

  • SHA512

    cb3a508e7d20f7632fa466f358ef43bad58afeb1d3ebf6f7b622ec67a0c86a79c55362663f943d0e6430c1360fb766054e61b43e60b925b4f47537a1aca6783b

  • SSDEEP

    3072:kcjjuSrGn/x4+e7gyUvOvR0BZNnvRF0oHoGJW+kXfdPC7ho0rSzJ6V307D+:kcjjuSrGn/x4+e7PUvOvR0BZNnv30oHv

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3.exe
    "C:\Users\Admin\AppData\Local\Temp\559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Mzb..bat" > nul 2> nul
      2⤵
        PID:3088

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Mzb..bat

      Filesize

      274B

      MD5

      942e881278d95c6be420f360bc3088c0

      SHA1

      661ac52c123efe9d75057badfd516d0f665d64e7

      SHA256

      a6c259abeea6490a0077a45823ab155b26fed0555127bd5fb4ca1318f61dfa6c

      SHA512

      2e03718e3cdee5598ccc806dfc7a81eec98c5101a0c638c91ab9f31d442c224fecd3efde296a40c6ea7f13a1ed8a181ba7f32dcc937c665547003dd38a45db8f

    • memory/2564-132-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2564-133-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2564-135-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3088-134-0x0000000000000000-mapping.dmp