Analysis

  • max time kernel
    131s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2022 21:51

General

  • Target

    e0f03a1e205abc2151d8594828365c4118fddcce4c9a868eb0058d4c18afa7de.exe

  • Size

    81KB

  • MD5

    562f513ac9fccb78033c4407422ceec0

  • SHA1

    f7ecfdad477220186bf9c75db6e3a0eff67033a1

  • SHA256

    e0f03a1e205abc2151d8594828365c4118fddcce4c9a868eb0058d4c18afa7de

  • SHA512

    89dca939714b45c2dabbd7a50f1b8c7c0011e55089d09459b5b27cc80f454dac6259066bb982a4deaa6a3e5943975b05024b9ab53101c1b174d369fb45afc01d

  • SSDEEP

    1536:2rqIrFYqRTFzETE3AtpuGxrUh1+SQptDr59:2rqIrFYuTlAvvDtf

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0f03a1e205abc2151d8594828365c4118fddcce4c9a868eb0058d4c18afa7de.exe
    "C:\Users\Admin\AppData\Local\Temp\e0f03a1e205abc2151d8594828365c4118fddcce4c9a868eb0058d4c18afa7de.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:396
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e0f03a1e205abc2151d8594828365c4118fddcce4c9a868eb0058d4c18afa7de.rtf" /o ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\e0f03a1e205abc2151d8594828365c4118fddcce4c9a868eb0058d4c18afa7de.rtf

    Filesize

    5KB

    MD5

    cac843d43cd41257be1b4a6c34225be8

    SHA1

    50f599dcd2f9a9df75c83af4135301d4a707e678

    SHA256

    7026bdbd752ae063344ce078085dc2e15b4520cab5eec4a22f7d9bf2f10929d3

    SHA512

    22994168e9724f447338343ae3d99b774a24d86a29cff13331ec485678e29b824223bcf34454d5c1a250a990f56014c3bc133093d7fc35a947fca693e1d0520b

  • memory/396-132-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/396-142-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/4128-136-0x00007FF941D50000-0x00007FF941D60000-memory.dmp

    Filesize

    64KB

  • memory/4128-135-0x00007FF941D50000-0x00007FF941D60000-memory.dmp

    Filesize

    64KB

  • memory/4128-137-0x00007FF941D50000-0x00007FF941D60000-memory.dmp

    Filesize

    64KB

  • memory/4128-138-0x00007FF941D50000-0x00007FF941D60000-memory.dmp

    Filesize

    64KB

  • memory/4128-139-0x00007FF93F700000-0x00007FF93F710000-memory.dmp

    Filesize

    64KB

  • memory/4128-140-0x00007FF93F700000-0x00007FF93F710000-memory.dmp

    Filesize

    64KB

  • memory/4128-134-0x00007FF941D50000-0x00007FF941D60000-memory.dmp

    Filesize

    64KB

  • memory/4128-133-0x0000000000000000-mapping.dmp

  • memory/4128-144-0x00007FF941D50000-0x00007FF941D60000-memory.dmp

    Filesize

    64KB

  • memory/4128-147-0x00007FF941D50000-0x00007FF941D60000-memory.dmp

    Filesize

    64KB

  • memory/4128-146-0x00007FF941D50000-0x00007FF941D60000-memory.dmp

    Filesize

    64KB

  • memory/4128-145-0x00007FF941D50000-0x00007FF941D60000-memory.dmp

    Filesize

    64KB