Analysis

  • max time kernel
    93s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 08:26

General

  • Target

    0a564855ac1df4ff74645e4a266a963a41868d7c49ca644753bf4a1855e7abe1.exe

  • Size

    239KB

  • MD5

    4bc2867068deecc96f2ee482073b5650

  • SHA1

    5741c51ba51354c91234e953f47d7bb67727c9c5

  • SHA256

    0a564855ac1df4ff74645e4a266a963a41868d7c49ca644753bf4a1855e7abe1

  • SHA512

    cb081c7ce4cc5804c0fc7614d1c61d9dd1ca521b3611cc4bcec1554f41662953e42061a55cc8b3cbffe30c3dc49e55c76621183a4d86a12ef7c75446117a2fc4

  • SSDEEP

    3072:Ybziv5Eh+IHv4TeQjhndqMiGHIy/tcZlfPxSYDv567vo:82vihx5QjJwMTHHlUnFd6T

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a564855ac1df4ff74645e4a266a963a41868d7c49ca644753bf4a1855e7abe1.exe
    "C:\Users\Admin\AppData\Local\Temp\0a564855ac1df4ff74645e4a266a963a41868d7c49ca644753bf4a1855e7abe1.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\AppData\Local\Temp\0a564855ac1df4ff74645e4a266a963a41868d7c49ca644753bf4a1855e7abe1.exe
      C:\Users\Admin\AppData\Local\Temp\0a564855ac1df4ff74645e4a266a963a41868d7c49ca644753bf4a1855e7abe1.exe -SafeSys
      2⤵
      • Checks computer location settings
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Windows\SysWOW64\Rundll32.exe
        "C:\Windows\system32\Rundll32.exe" "C:\Program Files (x86)\lhunj.bak",MyDLLEntry
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:4072
    • C:\Program Files (x86)\Common Files\SafeSys.exe
      "C:\Program Files (x86)\Common Files\SafeSys.exe" SafeSys
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3588
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:2752

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Common Files\SafeSys.exe

      Filesize

      239KB

      MD5

      4bc2867068deecc96f2ee482073b5650

      SHA1

      5741c51ba51354c91234e953f47d7bb67727c9c5

      SHA256

      0a564855ac1df4ff74645e4a266a963a41868d7c49ca644753bf4a1855e7abe1

      SHA512

      cb081c7ce4cc5804c0fc7614d1c61d9dd1ca521b3611cc4bcec1554f41662953e42061a55cc8b3cbffe30c3dc49e55c76621183a4d86a12ef7c75446117a2fc4

    • C:\Program Files (x86)\Common Files\SafeSys.exe

      Filesize

      239KB

      MD5

      4bc2867068deecc96f2ee482073b5650

      SHA1

      5741c51ba51354c91234e953f47d7bb67727c9c5

      SHA256

      0a564855ac1df4ff74645e4a266a963a41868d7c49ca644753bf4a1855e7abe1

      SHA512

      cb081c7ce4cc5804c0fc7614d1c61d9dd1ca521b3611cc4bcec1554f41662953e42061a55cc8b3cbffe30c3dc49e55c76621183a4d86a12ef7c75446117a2fc4

    • C:\Program Files (x86)\lhunj.bak

      Filesize

      11KB

      MD5

      b0446ab2521d6192d2822ae762f449d3

      SHA1

      faf7c23d599a0176769e725de1c4118d4fcf5745

      SHA256

      3a0c35d289e3abc9004905abeac139674ddba348d5ab98ae863f73c194ffa4cc

      SHA512

      34d270eeb518dec27682d21638574e5ba560c746ac45d2d24405c201a3887f36aab273864a361a5681086068dde85c9ae4180b2edd9985ee3b37c07d4a607710

    • C:\Program Files (x86)\lhunj.bak

      Filesize

      11KB

      MD5

      b0446ab2521d6192d2822ae762f449d3

      SHA1

      faf7c23d599a0176769e725de1c4118d4fcf5745

      SHA256

      3a0c35d289e3abc9004905abeac139674ddba348d5ab98ae863f73c194ffa4cc

      SHA512

      34d270eeb518dec27682d21638574e5ba560c746ac45d2d24405c201a3887f36aab273864a361a5681086068dde85c9ae4180b2edd9985ee3b37c07d4a607710

    • memory/1016-145-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1016-132-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3588-144-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/4072-138-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/4072-139-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/4800-135-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB