Analysis

  • max time kernel
    90s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 20:54

General

  • Target

    b0076c13492984647498cf5ac8558ab834a8c63c87d237e1f6211f591de2a9c9.exe

  • Size

    600KB

  • MD5

    797871aad1cf127495c446876025ad28

  • SHA1

    801f1c3000f8369cc2dad59c85c579ebfabbda04

  • SHA256

    b0076c13492984647498cf5ac8558ab834a8c63c87d237e1f6211f591de2a9c9

  • SHA512

    d1cea280434c2c64eb229a986a66e7e8deb2d6bf1df06d72d89a3467c9bedbbd8aed9c261e8cc35b8ad64697323ac21a17edab20cc03e71f5d37ee0c60ffba63

  • SSDEEP

    12288:i78ByWqjMd2TgDc66CVE8rObc/2izosb5u6uWeZUdE+pznUaH:EsyWqjxgDc6YoObcdoWE/jUdE+pDUaH

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0076c13492984647498cf5ac8558ab834a8c63c87d237e1f6211f591de2a9c9.exe
    "C:\Users\Admin\AppData\Local\Temp\b0076c13492984647498cf5ac8558ab834a8c63c87d237e1f6211f591de2a9c9.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Users\Admin\AppData\Local\Temp\n1147\s1147.exe
      "C:\Users\Admin\AppData\Local\Temp\n1147\s1147.exe" 7e757072b22cf6735c6f4ee7WfZrJSh6LpTgDMsBQuhRz/RruOdKlthuf4wY0I0RkgxbcPWXvg45YhRgQxBFmMvYgtYB01OkJVNmzlopUdbGrI3+imFlSdUxqtBf1SO8mj1j/UFniVMaLgbS1TyS1tEDjvWTQP/n29p3WnxThZoRxaG+UqP2+FySihLYCA== /v "C:\Users\Admin\AppData\Local\Temp\b0076c13492984647498cf5ac8558ab834a8c63c87d237e1f6211f591de2a9c9.exe" /a
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n1147\s1147.exe

    Filesize

    220KB

    MD5

    e2fa37bbdada70ed09883b4f17d0c81a

    SHA1

    00b1035472dde2678ba7a6f0836a36bbe02e1db6

    SHA256

    c2e4f6c6fc33a486c8b3620446e421de374d272743efb2b9cc89f2a8ac57a850

    SHA512

    1ead5dfebbed040c2cfafa3da681d986a4ee9d99caa6f0571f981234a3d399586fd344ab6aa0c27c5c4bcd430293341d629cb89e62a92cd1fe8bdad2408f0631

  • C:\Users\Admin\AppData\Local\Temp\n1147\s1147.exe

    Filesize

    220KB

    MD5

    e2fa37bbdada70ed09883b4f17d0c81a

    SHA1

    00b1035472dde2678ba7a6f0836a36bbe02e1db6

    SHA256

    c2e4f6c6fc33a486c8b3620446e421de374d272743efb2b9cc89f2a8ac57a850

    SHA512

    1ead5dfebbed040c2cfafa3da681d986a4ee9d99caa6f0571f981234a3d399586fd344ab6aa0c27c5c4bcd430293341d629cb89e62a92cd1fe8bdad2408f0631

  • memory/2380-135-0x000000001C3B0000-0x000000001CDE6000-memory.dmp

    Filesize

    10.2MB

  • memory/2380-136-0x000000000131A000-0x000000000131F000-memory.dmp

    Filesize

    20KB

  • memory/2380-137-0x000000000131A000-0x000000000131F000-memory.dmp

    Filesize

    20KB

  • memory/2380-138-0x000000000131A000-0x000000000131F000-memory.dmp

    Filesize

    20KB