Analysis

  • max time kernel
    152s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 03:30

General

  • Target

    894ac502ce27fbeba5a21c0101b5c6a05763dfd55fba96054cf7b9eee607cd08.exe

  • Size

    537KB

  • MD5

    24354e9ffbfbb87f4cb03f2ebff7eabd

  • SHA1

    839619b236df9819c852e796e47fd21df0ca9d5c

  • SHA256

    894ac502ce27fbeba5a21c0101b5c6a05763dfd55fba96054cf7b9eee607cd08

  • SHA512

    2d6aff595a8eba1f99b64082dedfd16d09473f0df2bf0ffea6ac16de20d6ffa02fd324952a56193f79f0945ddd5b60674ed8f24fa3f7e990fbde35685159c3cd

  • SSDEEP

    6144:4GZVOju21S3mPSrsn9SYM99xevuzUT2NA:LVOjunt4ncV92uYTX

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\894ac502ce27fbeba5a21c0101b5c6a05763dfd55fba96054cf7b9eee607cd08.exe
    "C:\Users\Admin\AppData\Local\Temp\894ac502ce27fbeba5a21c0101b5c6a05763dfd55fba96054cf7b9eee607cd08.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Users\Admin\AppData\Local\Temp\Trojan.exe
      "C:\Users\Admin\AppData\Local\Temp\Trojan.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:4496

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3781B4A3713292956206932165FA4132_247C447D981AB87548C17087CA562739

          Filesize

          471B

          MD5

          32b3ec1df40736898bbbdc239b700967

          SHA1

          f5dde6fe42c46846df9c95272f6f77ea9ae1037e

          SHA256

          fa9f6a0f5e8bf8a7b206e7435e4f9dc0992ee0897fe3d9708195fec8ce1b0ac9

          SHA512

          1f7013ca963fbe7c02c24ac06e245d5eb52b661153f7b4f86ef35dc362b714d80f302ff4c1633e7477a7beb28bf19db077973dde9664e10412c379b5746fd7a8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8890A77645B73478F5B1DED18ACBF795_E1EDEF0C21AE75D448F7327475DF4C9E

          Filesize

          471B

          MD5

          cdc8f09d737719d1749d9d24a79a7b34

          SHA1

          2a9719ea6f616d42f82548652ceab34c53028aff

          SHA256

          058fdc2241fc1f8e926b77d8ee4095a05539d070d0f5b8b5749a16befb255f90

          SHA512

          782b348913f06938adafcaf480cd51590d160f9b39f4f798889ea4287e678b19ca5f8e358894698c4d13997ee1db7ea1b091feb0c08c68c698e186f9bf00e13b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3781B4A3713292956206932165FA4132_247C447D981AB87548C17087CA562739

          Filesize

          438B

          MD5

          2f52295e63ec4b101b35bc70421909c8

          SHA1

          92bd09377505b43a2dd1e3db351cc71787ced25b

          SHA256

          67154c10d5473eae9123b975dc4ec4b627a98fa5ed9ea8dce11c10239831b70e

          SHA512

          5694f1caf2ab141cb58b5661445d684504b2da5f20e9003f9ac97c167385688f5b4b410149dd82a1c071f42395dd17bb96ca9546bce5faa5cc2dc2095b1ed878

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8890A77645B73478F5B1DED18ACBF795_E1EDEF0C21AE75D448F7327475DF4C9E

          Filesize

          430B

          MD5

          fd28bc172f805fbfa4f7ffb52312af95

          SHA1

          e356228eef598ac71f90fcd14ab1855df32dad31

          SHA256

          09a2621c06ffee683c26550012d491465f3baf71da59fec6a503a084f48375d7

          SHA512

          4afde9d867d0b003445188f5c3711db6d12633529833d2a8d984d69b5cee7068db81301b8e6154f1f4ff5ae7e9d104c39b1a64ea3c851c14c146a42bf099c0c4

        • C:\Users\Admin\AppData\Local\Temp\Trojan.exe

          Filesize

          537KB

          MD5

          24354e9ffbfbb87f4cb03f2ebff7eabd

          SHA1

          839619b236df9819c852e796e47fd21df0ca9d5c

          SHA256

          894ac502ce27fbeba5a21c0101b5c6a05763dfd55fba96054cf7b9eee607cd08

          SHA512

          2d6aff595a8eba1f99b64082dedfd16d09473f0df2bf0ffea6ac16de20d6ffa02fd324952a56193f79f0945ddd5b60674ed8f24fa3f7e990fbde35685159c3cd

        • C:\Users\Admin\AppData\Local\Temp\Trojan.exe

          Filesize

          537KB

          MD5

          24354e9ffbfbb87f4cb03f2ebff7eabd

          SHA1

          839619b236df9819c852e796e47fd21df0ca9d5c

          SHA256

          894ac502ce27fbeba5a21c0101b5c6a05763dfd55fba96054cf7b9eee607cd08

          SHA512

          2d6aff595a8eba1f99b64082dedfd16d09473f0df2bf0ffea6ac16de20d6ffa02fd324952a56193f79f0945ddd5b60674ed8f24fa3f7e990fbde35685159c3cd

        • memory/1988-141-0x0000000074850000-0x0000000074E01000-memory.dmp

          Filesize

          5.7MB

        • memory/1988-144-0x0000000074850000-0x0000000074E01000-memory.dmp

          Filesize

          5.7MB

        • memory/4952-132-0x0000000074850000-0x0000000074E01000-memory.dmp

          Filesize

          5.7MB

        • memory/4952-133-0x0000000074850000-0x0000000074E01000-memory.dmp

          Filesize

          5.7MB

        • memory/4952-142-0x0000000074850000-0x0000000074E01000-memory.dmp

          Filesize

          5.7MB