Analysis

  • max time kernel
    119s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 10:43

General

  • Target

    1_nas2022-NAS管理-rw.exe

  • Size

    81KB

  • MD5

    6a9c1fd245ee2350ee7f1e27a36fb0ff

  • SHA1

    4b3e3d9fb614ac6a82c689112d9f237bff06d1bd

  • SHA256

    b45a262789e9f238dc8c00b9640db1c40b4cc08ceb365ddff53b946ff85d9dd8

  • SHA512

    51146e59fe8c191bb9881d67b4d5551355ec5fdbdf64363daa0490ef22054d30df661f1d576754a3128946f16ad18fd0fd9f2b6243d4a6d4593ad6de8f264bed

  • SSDEEP

    768:LRV8cOu2NOSnJLnRF8vpSOQmiqLBbBC2Kb8l9hVh2+E4AHwc/o+9IHqHYDZhYWFz:rBmOSn+MOQBqNbHKQ3hfEXN8

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates connected drives 3 TTPs 33 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1_nas2022-NAS管理-rw.exe
    "C:\Users\Admin\AppData\Local\Temp\1_nas2022-NAS管理-rw.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nDeC83\1_nas2022-NAS管理-rw.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Windows\system32\net.exe
        NET USE H: /delete
        3⤵
        • Enumerates connected drives
        PID:4948
      • C:\Windows\system32\net.exe
        NET USE I: /delete
        3⤵
        • Enumerates connected drives
        PID:4036
      • C:\Windows\system32\net.exe
        NET USE J: /delete
        3⤵
        • Enumerates connected drives
        PID:3480
      • C:\Windows\system32\net.exe
        NET USE K: /delete
        3⤵
        • Enumerates connected drives
        PID:4632
      • C:\Windows\system32\net.exe
        NET USE L: /delete
        3⤵
        • Enumerates connected drives
        PID:3396
      • C:\Windows\system32\net.exe
        NET USE M: /delete
        3⤵
        • Enumerates connected drives
        PID:4692
      • C:\Windows\system32\net.exe
        NET USE N: /delete
        3⤵
        • Enumerates connected drives
        PID:4328
      • C:\Windows\system32\net.exe
        NET USE O: /delete
        3⤵
        • Enumerates connected drives
        PID:4560
      • C:\Windows\system32\net.exe
        NET USE P: /delete
        3⤵
        • Enumerates connected drives
        PID:4852
      • C:\Windows\system32\net.exe
        NET USE Q: /delete
        3⤵
        • Enumerates connected drives
        PID:3668
      • C:\Windows\system32\net.exe
        NET USE R: /delete
        3⤵
        • Enumerates connected drives
        PID:1884
      • C:\Windows\system32\net.exe
        NET USE S: /delete
        3⤵
        • Enumerates connected drives
        PID:5048
      • C:\Windows\system32\net.exe
        NET USE T: /delete
        3⤵
        • Enumerates connected drives
        PID:4456
      • C:\Windows\system32\net.exe
        NET USE U: /delete
        3⤵
        • Enumerates connected drives
        PID:5032
      • C:\Windows\system32\net.exe
        NET USE V: /delete
        3⤵
        • Enumerates connected drives
        PID:1792
      • C:\Windows\system32\net.exe
        NET USE W: /delete
        3⤵
        • Enumerates connected drives
        PID:3624
      • C:\Windows\system32\net.exe
        NET USE X: /delete
        3⤵
        • Enumerates connected drives
        PID:5080
      • C:\Windows\system32\net.exe
        NET USE Y: /delete
        3⤵
        • Enumerates connected drives
        PID:1844
      • C:\Windows\system32\net.exe
        NET USE Z: /delete
        3⤵
        • Enumerates connected drives
        PID:972
      • C:\Windows\system32\cmdkey.exe
        cmdkey /add:192.168.1.206 /user:sgsgictsup /pass:sgictsup-rw33122060afk
        3⤵
          PID:3044
        • C:\Windows\system32\net.exe
          NET USE N: \\192.168.1.206\Drivers /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:3236
        • C:\Windows\system32\net.exe
          NET USE O: \\192.168.1.206\Information /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:4388
        • C:\Windows\system32\net.exe
          NET USE P: \\192.168.1.206\privacy /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:4232
        • C:\Windows\system32\net.exe
          NET USE R: \\192.168.1.206\è╟ù¥òö /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:1796
        • C:\Windows\system32\net.exe
          NET USE S: \\192.168.1.206\îoù¥Ä║ /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:1812
        • C:\Windows\system32\net.exe
          NET USE T: \\192.168.1.206\É}ÅæÄ║ /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:3456
        • C:\Windows\system32\net.exe
          NET USE U: \\192.168.1.206\ôîï₧ò█êτÉΩûσèwìZ /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:3400
        • C:\Windows\system32\net.exe
          NET USE V: \\192.168.1.206\É╣ÉSèwëÇùcÆtëÇ /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:3476
        • C:\Windows\system32\net.exe
          NET USE W: \\192.168.1.206\âTâôâüEâZâVâèâA /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:4404
        • C:\Windows\system32\net.exe
          NET USE X: \\192.168.1.206\Åεò±âVâXâeâÇÄ║$ /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:1724
        • C:\Windows\system32\net.exe
          NET USE Y: \\192.168.1.206\è╟ù¥òöÄûû▒Æ╖$ /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:2732
        • C:\Windows\system32\net.exe
          NET USE Z: \\192.168.1.206\NAS-backup$ /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:3672
        • C:\Windows\system32\net.exe
          NET USE L: \\192.168.1.206\ï│û▒òöò¢ìZÆ╖$ /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:5088
        • C:\Windows\system32\net.exe
          NET USE M: \\192.168.1.206\âLâââèâAâZâôâü[$ /PERSISTENT:YES
          3⤵
          • Enumerates connected drives
          PID:4972

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nDeC83\1_nas2022-NAS管理-rw.bat

      Filesize

      1KB

      MD5

      fa0c8abad733422fbf67de67dc8bb6dc

      SHA1

      4a486a3e07d80298da1f6329734eff156263efdc

      SHA256

      82bb11c0bdd19ec8eae974fb3f625aaf050549065ce41f970558f2dabbd1732c

      SHA512

      c5befe8e7b75f6d55a45d33e7232987e5916109f8b5cb1ac46a1118c8effca03df987da28ee4b0cc5e4a2cd104c0ef4e5ef7a3123d61a434946aded600ea6016

    • memory/5096-132-0x00000000008C0000-0x00000000008D8000-memory.dmp

      Filesize

      96KB