Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2022 19:20

General

  • Target

    dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89.exe

  • Size

    77KB

  • MD5

    adc129ed77eca9cdc4677ff34cfa601b

  • SHA1

    68a91bcd2ad8229cfba86b71d80a4a49ca489f8c

  • SHA256

    dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89

  • SHA512

    89118f29c6db2b722df3417c27a121d04a25ddf5e7821699f59f52f1ea579e8201ecfed419f068d7903fc42ae8e9e89c56bb0d546183d4750464cd828e8e2f01

  • SSDEEP

    768:o73OtJDvhzNDnwGk58sCuStfXR+VxhHg1rpgQwdYhijQFBpBTBH+WM0Zjz:oa/DvVNm58kSWHgJ0Yw0bpBd19z

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89.exe
    "C:\Users\Admin\AppData\Local\Temp\dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Users\Admin\AppData\Local\Temp\pdfmarks.exe
      "C:\Users\Admin\AppData\Local\Temp\pdfmarks.exe"
      2⤵
      • Executes dropped EXE
      PID:580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pdfmarks.exe

    Filesize

    77KB

    MD5

    74d5aa13e69ae45dcd379b731bc6ab2e

    SHA1

    7500254e0bc8bd35a14118ab0c932835630ec4a7

    SHA256

    0842580496f9d0d73a77ae6d1a0a690f0f387ca98f8f47aad4d0eea2d7688c77

    SHA512

    5fa4553a99d59eb801ba80f29133d897439ab939bb5f108e1c5b3f0d15c676b5f7cde2c07063f893509471cde1795c033f7c5864abd2d730106d22b6fbcce897

  • C:\Users\Admin\AppData\Local\Temp\pdfmarks.exe

    Filesize

    77KB

    MD5

    74d5aa13e69ae45dcd379b731bc6ab2e

    SHA1

    7500254e0bc8bd35a14118ab0c932835630ec4a7

    SHA256

    0842580496f9d0d73a77ae6d1a0a690f0f387ca98f8f47aad4d0eea2d7688c77

    SHA512

    5fa4553a99d59eb801ba80f29133d897439ab939bb5f108e1c5b3f0d15c676b5f7cde2c07063f893509471cde1795c033f7c5864abd2d730106d22b6fbcce897

  • memory/580-139-0x0000000000880000-0x0000000000890000-memory.dmp

    Filesize

    64KB

  • memory/580-141-0x0000000000890000-0x0000000000894000-memory.dmp

    Filesize

    16KB

  • memory/5072-132-0x00000000009C0000-0x00000000009D0000-memory.dmp

    Filesize

    64KB

  • memory/5072-133-0x00000000009D0000-0x00000000009D4000-memory.dmp

    Filesize

    16KB

  • memory/5072-134-0x00000000009D0000-0x00000000009D4000-memory.dmp

    Filesize

    16KB

  • memory/5072-135-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB