Analysis

  • max time kernel
    150s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-10-2022 07:58

General

  • Target

    a9175491a108645ba2f0f906d639bd94e895e41370e6c23c59b95ab4a927a6fa.exe

  • Size

    545KB

  • MD5

    3573fb365cb90f54324ed47ed2bfdfdb

  • SHA1

    dc0271cf8d5d55e1a6b1ff71a9e70d8009c6e318

  • SHA256

    a9175491a108645ba2f0f906d639bd94e895e41370e6c23c59b95ab4a927a6fa

  • SHA512

    ccb1b53152e34a5ef824eb757c39e62804447f3848a80b6d50ac7e46b3f8b3959dd4dea983216cc62114cf0ed9e799ca4d53555bcda2da916329526fe1410f27

  • SSDEEP

    12288:xgQQb7xw4qJB4jRrDKO+OeO+OeNhBBhhBB937cpqPO0VcvMTrN9bSJG358uOhPKS:xhrQrDgJ1dvN9/g6M

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9175491a108645ba2f0f906d639bd94e895e41370e6c23c59b95ab4a927a6fa.exe
    "C:\Users\Admin\AppData\Local\Temp\a9175491a108645ba2f0f906d639bd94e895e41370e6c23c59b95ab4a927a6fa.exe"
    1⤵
      PID:1388
    • C:\Windows\System32\control.exe
      "C:\Windows\System32\control.exe" "C:\Windows\system32\timedate.cpl",
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\system32\timedate.cpl",
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1112
        • C:\Windows\System32\control.exe
          "C:\Windows\System32\control.exe" "C:\Windows\system32\intl.cpl",,/p:"date"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:964
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\system32\intl.cpl",,/p:"date"
            4⤵
            • Checks computer location settings
            • Modifies Control Panel
            PID:1764

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/964-57-0x0000000000000000-mapping.dmp

    • memory/968-54-0x000007FEFC141000-0x000007FEFC143000-memory.dmp

      Filesize

      8KB

    • memory/1112-55-0x0000000000000000-mapping.dmp

    • memory/1764-59-0x0000000000000000-mapping.dmp