Analysis

  • max time kernel
    169s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 17:24

General

  • Target

    5c1263b63c4565ed2ba14de305d29475c94640903a26aef14dd44f77072089cf.exe

  • Size

    635KB

  • MD5

    a064fb6dbea822acd7b7aa7e40e0fff0

  • SHA1

    1dd3a254846c51df8702689dea0997f5b486fca1

  • SHA256

    5c1263b63c4565ed2ba14de305d29475c94640903a26aef14dd44f77072089cf

  • SHA512

    bc5668d22f49bd319b25aa5815b91b8fd798490d2bca2c96d814fadc5011f2988db5fb728b5f0bd51dc82c23e75c838ccf70baff31970f523f52042c73ff6856

  • SSDEEP

    12288:VHjcoe9PH96vB/fAuBcm9TyOE/xG3muGx44MG4Yx:VDgINfAuBcgcZG2uG24MG4Y

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c1263b63c4565ed2ba14de305d29475c94640903a26aef14dd44f77072089cf.exe
    "C:\Users\Admin\AppData\Local\Temp\5c1263b63c4565ed2ba14de305d29475c94640903a26aef14dd44f77072089cf.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Users\Admin\AppData\Local\Temp\ojsyku.exe
      C:\Users\Admin\AppData\Local\Temp\ojsyku.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4932
      • C:\Users\Admin\AppData\Local\Temp\~DFA243.tmp
        C:\Users\Admin\AppData\Local\Temp\~DFA243.tmp OK
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4868
        • C:\Users\Admin\AppData\Local\Temp\wicody.exe
          "C:\Users\Admin\AppData\Local\Temp\wicody.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1284
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "
      2⤵
        PID:4700

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\_uninsep.bat

            Filesize

            341B

            MD5

            5769130153468f7ac340d719c4b3f3c1

            SHA1

            6dcf1b3d8f5e4135d16cbc0ec2aafd1ab274682a

            SHA256

            c3c307f4eb472fcc1392c3adc96434c450c2a70313e525769445aae9db030e10

            SHA512

            109452b5dd02d4a52b2288e70a0816f8497f8c73a06b4f50fa932c6eeedb2f2318c156c73c33881b0927371c68e059cdae3b82f720b5736f5197e45decc52469

          • C:\Users\Admin\AppData\Local\Temp\gbp.ini

            Filesize

            104B

            MD5

            86bb2dbeaef655893262f3c041f6afe2

            SHA1

            1b26ff1241c1353bd506c18bd0c11878076ba65d

            SHA256

            4a57643d2c59d1235bc0926f845583f39345839e3e9428ad619eb4b6baf96ad2

            SHA512

            58294cfaa5882a4c5625c03fe6f9e4882912b31f7169241f95626745d66c0a746083a9044365943d66ae7a420113d28c0ddd642c4ed697c683deb63796a13d31

          • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

            Filesize

            480B

            MD5

            b34f7c44255fee64bb8c9dfa20a10d69

            SHA1

            7c9d8808194afb9c922758b3b4764ca622c35772

            SHA256

            d8ec7a49ce6e509ebac2824951aea94eb90763f74b9dd60565ad589ae914dabc

            SHA512

            fe48eba6bbfe391739a667a6d95fe814ebb59f17b946df755d688a0ab66746217192349e9a4fb12d93894967eb8f09461d0a05096fcc09e3226c332b97405168

          • C:\Users\Admin\AppData\Local\Temp\ojsyku.exe

            Filesize

            643KB

            MD5

            d21031be642f3e87ce94b0b65ef93d47

            SHA1

            1c116d4910a79469420d2aeba12a2f7ba94eb076

            SHA256

            59f66aa1775b801248200e3e688f15c4027ee7c7743c0b1d5396ff3c23dfa2cb

            SHA512

            aa2246f658718142381f3726a82bdfd9ef09b9ab4b139e79658d1e3120d3898d48e02464f5b9a5174d6dd6114f5dcb36ebe70e083bb437e6f94380e769d1a4b2

          • C:\Users\Admin\AppData\Local\Temp\ojsyku.exe

            Filesize

            643KB

            MD5

            d21031be642f3e87ce94b0b65ef93d47

            SHA1

            1c116d4910a79469420d2aeba12a2f7ba94eb076

            SHA256

            59f66aa1775b801248200e3e688f15c4027ee7c7743c0b1d5396ff3c23dfa2cb

            SHA512

            aa2246f658718142381f3726a82bdfd9ef09b9ab4b139e79658d1e3120d3898d48e02464f5b9a5174d6dd6114f5dcb36ebe70e083bb437e6f94380e769d1a4b2

          • C:\Users\Admin\AppData\Local\Temp\wicody.exe

            Filesize

            372KB

            MD5

            d796a857c410e3bf4a0897d67852843e

            SHA1

            3a074a091ee7008747fab1d9548102d750242d67

            SHA256

            57b3b8dcbc2a09236345a33344899891e5e6d241ab0898f988c0f24228f31f3c

            SHA512

            28a6e7d34f620db9a63e3d86a4c0c4eae17f4ef00bfb5e9e59474f66192dc17c7d6ec201d4535d932788cd36f243f19b37f945c048df61eef6e910c89b973acb

          • C:\Users\Admin\AppData\Local\Temp\wicody.exe

            Filesize

            372KB

            MD5

            d796a857c410e3bf4a0897d67852843e

            SHA1

            3a074a091ee7008747fab1d9548102d750242d67

            SHA256

            57b3b8dcbc2a09236345a33344899891e5e6d241ab0898f988c0f24228f31f3c

            SHA512

            28a6e7d34f620db9a63e3d86a4c0c4eae17f4ef00bfb5e9e59474f66192dc17c7d6ec201d4535d932788cd36f243f19b37f945c048df61eef6e910c89b973acb

          • C:\Users\Admin\AppData\Local\Temp\~DFA243.tmp

            Filesize

            653KB

            MD5

            3206599fdc78611972ba65769c2b0f94

            SHA1

            5861f70729315a9c3707997a7901aa7c2e492ad5

            SHA256

            4273c0219862ee17ad29ff1efad965956035d73547f8b0198c62ddecfcca3a91

            SHA512

            ea3e78701563216c14b335c1b46d2899fe179206ba957609dce2dbf00dd74999f04950b3b3c31f7fc18a82daa6d992b0e62487e8b5f51755bda5199debc84d91

          • C:\Users\Admin\AppData\Local\Temp\~DFA243.tmp

            Filesize

            653KB

            MD5

            3206599fdc78611972ba65769c2b0f94

            SHA1

            5861f70729315a9c3707997a7901aa7c2e492ad5

            SHA256

            4273c0219862ee17ad29ff1efad965956035d73547f8b0198c62ddecfcca3a91

            SHA512

            ea3e78701563216c14b335c1b46d2899fe179206ba957609dce2dbf00dd74999f04950b3b3c31f7fc18a82daa6d992b0e62487e8b5f51755bda5199debc84d91

          • memory/1284-151-0x0000000000400000-0x000000000053E000-memory.dmp

            Filesize

            1.2MB

          • memory/1284-153-0x0000000000400000-0x000000000053E000-memory.dmp

            Filesize

            1.2MB

          • memory/3404-143-0x0000000000400000-0x00000000004DE000-memory.dmp

            Filesize

            888KB

          • memory/3404-146-0x0000000000400000-0x00000000004DE000-memory.dmp

            Filesize

            888KB

          • memory/3404-132-0x0000000000400000-0x00000000004DE000-memory.dmp

            Filesize

            888KB

          • memory/4868-141-0x0000000000400000-0x00000000004DE000-memory.dmp

            Filesize

            888KB

          • memory/4868-144-0x0000000000400000-0x00000000004DE000-memory.dmp

            Filesize

            888KB

          • memory/4932-137-0x0000000000400000-0x00000000004DE000-memory.dmp

            Filesize

            888KB

          • memory/4932-142-0x0000000000400000-0x00000000004DE000-memory.dmp

            Filesize

            888KB