Analysis

  • max time kernel
    102s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 06:37 UTC

General

  • Target

    5f2f873e60a22cf47ece5da0f1b98be79edca639e94769427f97d4904a817170.exe

  • Size

    129KB

  • MD5

    4fcc3fdc3960f40dcecfc6fff02738ef

  • SHA1

    dcc5c4562c952c31f80cc32843b24bc32b3617a7

  • SHA256

    5f2f873e60a22cf47ece5da0f1b98be79edca639e94769427f97d4904a817170

  • SHA512

    5c6bf1dcca32425c9d3259fae88011bfe3c85e09624d8d84d6729d422fce02ae19e177a2e5de53917247aeb28824d7bf7d49e82b8fbf3645b6e78746fc803095

  • SSDEEP

    3072:p8qlbOAxQFH9JPcQl1Q5brufmA6HVTIdddj1s6ElECDd:LbOAIXNl1Qp1J1TIdddj1snE8

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f2f873e60a22cf47ece5da0f1b98be79edca639e94769427f97d4904a817170.exe
    "C:\Users\Admin\AppData\Local\Temp\5f2f873e60a22cf47ece5da0f1b98be79edca639e94769427f97d4904a817170.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5004
    • C:\Users\Admin\AppData\Local\Temp\5f2f873e60a22cf47ece5da0f1b98be79edca639e94769427f97d4904a817170mgr.exe
      C:\Users\Admin\AppData\Local\Temp\5f2f873e60a22cf47ece5da0f1b98be79edca639e94769427f97d4904a817170mgr.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:1284
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 204
            4⤵
            • Program crash
            PID:4396
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2180
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2024
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:17410 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2388
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:82950 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1360
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe
          3⤵
            PID:4976
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 204
              4⤵
              • Program crash
              PID:3804
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2888
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              4⤵
              • Modifies Internet Explorer settings
              PID:2648
          • C:\Users\Admin\AppData\Local\Temp\bkqlejxjslnmigri.exe
            "C:\Users\Admin\AppData\Local\Temp\bkqlejxjslnmigri.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:664
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1284 -ip 1284
        1⤵
          PID:2268
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4976 -ip 4976
          1⤵
            PID:4016

          Network

          • flag-us
            DNS
            api.bing.com
            IEXPLORE.EXE
            Remote address:
            8.8.8.8:53
            Request
            api.bing.com
            IN A
            Response
            api.bing.com
            IN CNAME
            api-bing-com.e-0001.e-msedge.net
            api-bing-com.e-0001.e-msedge.net
            IN CNAME
            afd.e-0001.e-dc-msedge.net
            afd.e-0001.e-dc-msedge.net
            IN CNAME
            e-0001.e-dc-msedge.net
            e-0001.e-dc-msedge.net
            IN A
            13.107.13.80
          • flag-us
            DNS
            96.108.152.52.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            96.108.152.52.in-addr.arpa
            IN PTR
            Response
          • 209.197.3.8:80
            260 B
            5
          • 209.197.3.8:80
            260 B
            5
          • 104.46.162.224:443
            322 B
            7
          • 93.184.220.29:80
            322 B
            7
          • 209.197.3.8:80
            322 B
            7
          • 209.197.3.8:80
            322 B
            7
          • 209.197.3.8:80
            322 B
            7
          • 104.80.225.205:443
            322 B
            7
          • 93.184.220.29:80
            260 B
            5
          • 204.79.197.200:443
            ieonline.microsoft.com
            tls, http2
            IEXPLORE.EXE
            1.2kB
            8.1kB
            15
            14
          • 8.238.20.126:80
            46 B
            40 B
            1
            1
          • 8.238.20.126:80
            46 B
            40 B
            1
            1
          • 8.8.8.8:53
            api.bing.com
            dns
            IEXPLORE.EXE
            58 B
            171 B
            1
            1

            DNS Request

            api.bing.com

            DNS Response

            13.107.13.80

          • 8.8.8.8:53
            96.108.152.52.in-addr.arpa
            dns
            72 B
            146 B
            1
            1

            DNS Request

            96.108.152.52.in-addr.arpa

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\5f2f873e60a22cf47ece5da0f1b98be79edca639e94769427f97d4904a817170mgr.exe

            Filesize

            109KB

            MD5

            23dcf284359d24e3fbee7741c80f246d

            SHA1

            da45f93fe6c380c9f4b8b6dbba7943cf8b3688b3

            SHA256

            989006203c54720a6f43a83c597aa2564db9b77f4df2b6ff2ba772db0109deb2

            SHA512

            4a70bab783505c246f5a37dbce77a0529bf7c467c9c3f52e9edbef55fd36b735f64bc069ee3cde6939586f605daf895be90dc3604b40fa375b6a023568f2375d

          • C:\Users\Admin\AppData\Local\Temp\5f2f873e60a22cf47ece5da0f1b98be79edca639e94769427f97d4904a817170mgr.exe

            Filesize

            109KB

            MD5

            23dcf284359d24e3fbee7741c80f246d

            SHA1

            da45f93fe6c380c9f4b8b6dbba7943cf8b3688b3

            SHA256

            989006203c54720a6f43a83c597aa2564db9b77f4df2b6ff2ba772db0109deb2

            SHA512

            4a70bab783505c246f5a37dbce77a0529bf7c467c9c3f52e9edbef55fd36b735f64bc069ee3cde6939586f605daf895be90dc3604b40fa375b6a023568f2375d

          • C:\Users\Admin\AppData\Local\Temp\bkqlejxjslnmigri.exe

            Filesize

            109KB

            MD5

            23dcf284359d24e3fbee7741c80f246d

            SHA1

            da45f93fe6c380c9f4b8b6dbba7943cf8b3688b3

            SHA256

            989006203c54720a6f43a83c597aa2564db9b77f4df2b6ff2ba772db0109deb2

            SHA512

            4a70bab783505c246f5a37dbce77a0529bf7c467c9c3f52e9edbef55fd36b735f64bc069ee3cde6939586f605daf895be90dc3604b40fa375b6a023568f2375d

          • C:\Users\Admin\AppData\Local\Temp\bkqlejxjslnmigri.exe

            Filesize

            109KB

            MD5

            23dcf284359d24e3fbee7741c80f246d

            SHA1

            da45f93fe6c380c9f4b8b6dbba7943cf8b3688b3

            SHA256

            989006203c54720a6f43a83c597aa2564db9b77f4df2b6ff2ba772db0109deb2

            SHA512

            4a70bab783505c246f5a37dbce77a0529bf7c467c9c3f52e9edbef55fd36b735f64bc069ee3cde6939586f605daf895be90dc3604b40fa375b6a023568f2375d

          • memory/664-147-0x0000000000400000-0x0000000000437A70-memory.dmp

            Filesize

            222KB

          • memory/664-146-0x0000000000400000-0x0000000000437A70-memory.dmp

            Filesize

            222KB

          • memory/2556-139-0x0000000000400000-0x0000000000437A70-memory.dmp

            Filesize

            222KB

          • memory/2556-145-0x0000000000400000-0x0000000000437A70-memory.dmp

            Filesize

            222KB

          • memory/2556-136-0x0000000000400000-0x0000000000437A70-memory.dmp

            Filesize

            222KB

          • memory/5004-135-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.