Analysis

  • max time kernel
    136s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 03:18

General

  • Target

    7e48a2f2231593640d5659851dad095edf15e19c24dbe1e29297ddc52fcf8f2b.exe

  • Size

    212KB

  • MD5

    52aa68a076b089ea3570b00f1891e4a4

  • SHA1

    430e28c1452084e41954d3a7c3d2b3b9642df4bb

  • SHA256

    7e48a2f2231593640d5659851dad095edf15e19c24dbe1e29297ddc52fcf8f2b

  • SHA512

    676773c2b4a6228cfb1e056c969ef7a7f8ef7b214bc777912ddc85138b847d55c808cbcb7811ab72547f58dd141f6644e7f6b34282dbc0b592e1caaa151a36bb

  • SSDEEP

    3072:ZQExuz37QQK2PFuCNZ1z4FtP7qM98mORblMMIVBri4hDjKNhLf9TOaB4:VxuzthbZAOM98tp4vrLpGN1f9Oa2

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e48a2f2231593640d5659851dad095edf15e19c24dbe1e29297ddc52fcf8f2b.exe
    "C:\Users\Admin\AppData\Local\Temp\7e48a2f2231593640d5659851dad095edf15e19c24dbe1e29297ddc52fcf8f2b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5016
    • C:\Users\Admin\AppData\Local\Temp\SLw9R23
      "SLw9R23"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:3848
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 204
            4⤵
            • Program crash
            PID:1876
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3356
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3180
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3180 CREDAT:17410 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:5044
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3180 CREDAT:17416 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4540
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe
          3⤵
            PID:4808
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 204
              4⤵
              • Program crash
              PID:4480
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3420
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              4⤵
              • Modifies Internet Explorer settings
              PID:4768
          • C:\Users\Admin\AppData\Local\Temp\ypegkdsskouwbirp.exe
            "C:\Users\Admin\AppData\Local\Temp\ypegkdsskouwbirp.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3848 -ip 3848
        1⤵
          PID:3568
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4808 -ip 4808
          1⤵
            PID:544

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

            Filesize

            471B

            MD5

            6a15e3564b9eb382fe5534f59d6fccb4

            SHA1

            911dbc1a988c2d6816beb0c21c4ea5402253b884

            SHA256

            6b478c66c9a2024177d4a478ccea9a82f3162aa87a5125a0dc3750c920bdbc62

            SHA512

            2801f46d495eed08dbb10e73ccda4828faf4ef6b1ff3ff45ce8d73331e692381c25417d15c958f8c3f9c6932300cd0e66b1aad6bb5a92e2bf27b338b6d245711

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

            Filesize

            434B

            MD5

            3e4f1eec7848a9cd52b46790225a5d5c

            SHA1

            b3094183e10c67c444a244ffee84c703dff179c0

            SHA256

            950a6c232b6457d0b8e259fed2fa80cb1e1eafe72ccdbd241aa9090fe58aebe0

            SHA512

            722af218a733b78b166220d71f48388c7ca2f80c293a0622259904e743878184606ad04ad05a2c6c8503f5a8bb2fd7a18b9b9d7863ae042180e6dbdeaac67b69

          • C:\Users\Admin\AppData\Local\Temp\SLw9R23

            Filesize

            94KB

            MD5

            9b0f876cef335a2489822b49588ed462

            SHA1

            be7036761b0a1fbcb7d5aeb7f10e39368d871029

            SHA256

            3acfc174c67d0121ce5335888a7b559d44c94849e7f429c0509c487b5b533669

            SHA512

            bbf042c2190c2bab6227b84258fcf0ce8435960c2c47a9430a2fe27eccea84f9dc9e0c5487052f9b90f5459a323be2546df98e940e22c96dcc445ed4829b215b

          • C:\Users\Admin\AppData\Local\Temp\SLw9R23

            Filesize

            94KB

            MD5

            9b0f876cef335a2489822b49588ed462

            SHA1

            be7036761b0a1fbcb7d5aeb7f10e39368d871029

            SHA256

            3acfc174c67d0121ce5335888a7b559d44c94849e7f429c0509c487b5b533669

            SHA512

            bbf042c2190c2bab6227b84258fcf0ce8435960c2c47a9430a2fe27eccea84f9dc9e0c5487052f9b90f5459a323be2546df98e940e22c96dcc445ed4829b215b

          • C:\Users\Admin\AppData\Local\Temp\ypegkdsskouwbirp.exe

            Filesize

            94KB

            MD5

            9b0f876cef335a2489822b49588ed462

            SHA1

            be7036761b0a1fbcb7d5aeb7f10e39368d871029

            SHA256

            3acfc174c67d0121ce5335888a7b559d44c94849e7f429c0509c487b5b533669

            SHA512

            bbf042c2190c2bab6227b84258fcf0ce8435960c2c47a9430a2fe27eccea84f9dc9e0c5487052f9b90f5459a323be2546df98e940e22c96dcc445ed4829b215b

          • C:\Users\Admin\AppData\Local\Temp\ypegkdsskouwbirp.exe

            Filesize

            94KB

            MD5

            9b0f876cef335a2489822b49588ed462

            SHA1

            be7036761b0a1fbcb7d5aeb7f10e39368d871029

            SHA256

            3acfc174c67d0121ce5335888a7b559d44c94849e7f429c0509c487b5b533669

            SHA512

            bbf042c2190c2bab6227b84258fcf0ce8435960c2c47a9430a2fe27eccea84f9dc9e0c5487052f9b90f5459a323be2546df98e940e22c96dcc445ed4829b215b

          • memory/2140-146-0x0000000000400000-0x0000000000439BE4-memory.dmp

            Filesize

            230KB

          • memory/2140-138-0x0000000000400000-0x0000000000439BE4-memory.dmp

            Filesize

            230KB

          • memory/3020-147-0x0000000000400000-0x0000000000439BE4-memory.dmp

            Filesize

            230KB

          • memory/3020-148-0x0000000000400000-0x0000000000439BE4-memory.dmp

            Filesize

            230KB

          • memory/5016-134-0x0000000000400000-0x0000000000435000-memory.dmp

            Filesize

            212KB