Analysis

  • max time kernel
    112s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 08:59

General

  • Target

    f3195afb7dbb0b90dad896528070992736461fb400273c57bed1498896512cb1.exe

  • Size

    96KB

  • MD5

    160acdb0d86f849f9f47342ef3fe5f95

  • SHA1

    c50c1e22b815ef0ba28b63fe70bfa06bd85c3e93

  • SHA256

    f3195afb7dbb0b90dad896528070992736461fb400273c57bed1498896512cb1

  • SHA512

    8fa729cf7f945d678e41b90928a294a2ec64b896039da6c2ebc232abcd28178c06dd9d4debe3deac9303ae5c85a0b067cc5679f7a6b2dcb9ca00d135b09a56a5

  • SSDEEP

    1536:vTkzigHR3ShXPeT/YatdfI2lNYeT6JXOzVK9PAPGvP9Fk/a5NRdMe:A3YX0/XNjlNTT6dOGHP9Fk/avr1

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3195afb7dbb0b90dad896528070992736461fb400273c57bed1498896512cb1.exe
    "C:\Users\Admin\AppData\Local\Temp\f3195afb7dbb0b90dad896528070992736461fb400273c57bed1498896512cb1.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\windows\update.exe
      "C:\windows\update.exe"
      2⤵
      • Executes dropped EXE
      PID:2740
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 368
        3⤵
        • Program crash
        PID:3140
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c afc9fe2f418b00a0.bat
      2⤵
        PID:4912
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2740 -ip 2740
      1⤵
        PID:1592

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\afc9fe2f418b00a0.bat

              Filesize

              2KB

              MD5

              94b36f268cd343094fc1729b621cdb49

              SHA1

              1a88e26c6a07899b8c505ec70ebb0b6be02c4235

              SHA256

              536ae83d24100b1818307de4759d9bb4b776b6f9ff976914b2be966579d7a5e8

              SHA512

              9c0be04db3c4bc392a1a8ba05ebef883fd558da369ff1b90353c438bf2d29d088dc2915b6004f3cad149b7c1236330c190fccfc694245a336ffb02038d40eba7

            • C:\Windows\update.exe

              Filesize

              21.0MB

              MD5

              6b4ac8638169ce5a27885f1d65adf20f

              SHA1

              b662efbdff8557f1ea2c86c8c4a04e66cc9cb666

              SHA256

              8263ee0148924218221b6d20b30693aa40f48ecb9a9f8b06e8f8d26068191be4

              SHA512

              555213076ddd9bad3915a2a048025e57a55c4165a2cc69d51b3720bb71256f40e140851b3e8d353c8fd4bf074beb3c4d62690217d56fbd71834521812945122e

            • C:\windows\update.exe

              Filesize

              21.0MB

              MD5

              6b4ac8638169ce5a27885f1d65adf20f

              SHA1

              b662efbdff8557f1ea2c86c8c4a04e66cc9cb666

              SHA256

              8263ee0148924218221b6d20b30693aa40f48ecb9a9f8b06e8f8d26068191be4

              SHA512

              555213076ddd9bad3915a2a048025e57a55c4165a2cc69d51b3720bb71256f40e140851b3e8d353c8fd4bf074beb3c4d62690217d56fbd71834521812945122e

            • memory/2740-136-0x0000000000400000-0x000000000040B000-memory.dmp

              Filesize

              44KB

            • memory/4040-132-0x0000000000400000-0x0000000002E31000-memory.dmp

              Filesize

              42.2MB