Analysis

  • max time kernel
    97s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2022, 00:34

General

  • Target

    06cc6b757305a99fe80ae0e5589df4320878c3faa94693f4a2d187eb34120747.exe

  • Size

    1.7MB

  • MD5

    cd15717c0989bc77d228fc1781e2fe6f

  • SHA1

    f2ba580842070b92b0dbfbbb434aa2445c97e641

  • SHA256

    06cc6b757305a99fe80ae0e5589df4320878c3faa94693f4a2d187eb34120747

  • SHA512

    3d063207b3fde14e321372a8c1d953220f2fbe25d0cf832d8644d57bad2bd036709bd14a852056f62cfec147f53fc1022f014fdaf1a385df751986d8255a4130

  • SSDEEP

    49152:EuWxtk4ewkqydInKgbaRfEpXq+kELAkjy0n:EuWpmbKlqbwe0n

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06cc6b757305a99fe80ae0e5589df4320878c3faa94693f4a2d187eb34120747.exe
    "C:\Users\Admin\AppData\Local\Temp\06cc6b757305a99fe80ae0e5589df4320878c3faa94693f4a2d187eb34120747.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4548
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /Y .\P4CVF.vSK
      2⤵
      • Loads dropped DLL
      PID:1072

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\P4CVF.vSK

          Filesize

          2.7MB

          MD5

          3c2cdbf02fa9b37ffe3b36d605379e38

          SHA1

          2f14b1385d350772a90c686d0aa381d5f9d51e7b

          SHA256

          b92a270ba42d910cf777b6db07f418b21138b2dbfdfb030ddc4f68bc6afa4df2

          SHA512

          9bec70a034434845eb1e8998b06d0318c9596061163a0e3e0fcc1bec3590a2cf3b028249322df5c53542b35ffcf2478b1744cf724743bc32ac3a349d542bb144

        • C:\Users\Admin\AppData\Local\Temp\P4cvF.vsK

          Filesize

          2.7MB

          MD5

          3c2cdbf02fa9b37ffe3b36d605379e38

          SHA1

          2f14b1385d350772a90c686d0aa381d5f9d51e7b

          SHA256

          b92a270ba42d910cf777b6db07f418b21138b2dbfdfb030ddc4f68bc6afa4df2

          SHA512

          9bec70a034434845eb1e8998b06d0318c9596061163a0e3e0fcc1bec3590a2cf3b028249322df5c53542b35ffcf2478b1744cf724743bc32ac3a349d542bb144

        • memory/1072-135-0x00000000031C0000-0x0000000003428000-memory.dmp

          Filesize

          2.4MB

        • memory/1072-136-0x0000000003570000-0x00000000036A5000-memory.dmp

          Filesize

          1.2MB

        • memory/1072-137-0x00000000036B0000-0x0000000003775000-memory.dmp

          Filesize

          788KB

        • memory/1072-138-0x0000000003780000-0x0000000003830000-memory.dmp

          Filesize

          704KB

        • memory/1072-141-0x0000000003570000-0x00000000036A5000-memory.dmp

          Filesize

          1.2MB