Analysis

  • max time kernel
    167s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 14:35

General

  • Target

    967e46e510ca3cc841111bdcfcd85301fdbf9e6062f02bfac3f6d10ef0d618a8.exe

  • Size

    270KB

  • MD5

    a2f50300046583a2666dcfa114fe13d0

  • SHA1

    d13e61e45c8c69406e3c534b1c94615d836df746

  • SHA256

    967e46e510ca3cc841111bdcfcd85301fdbf9e6062f02bfac3f6d10ef0d618a8

  • SHA512

    e734e61da907b6ce374bafd1f38f8c605ad6434b59c1503d3813524fc1e113cf979ce051fe72379b34c0ead615067acb629f4bb7010e853ab5daef9f4d6d8654

  • SSDEEP

    3072:4xRDEbFUwUDxNQccrLPdKMCtuy4CWQ1NORruIJ9FqZWL+5bAhBwQnR+jkau6Pk:CDEpUdOPdKMCMrC1+RzFqftAznIjkn7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\967e46e510ca3cc841111bdcfcd85301fdbf9e6062f02bfac3f6d10ef0d618a8.exe
    "C:\Users\Admin\AppData\Local\Temp\967e46e510ca3cc841111bdcfcd85301fdbf9e6062f02bfac3f6d10ef0d618a8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3136
      • C:\Users\Admin\AppData\Roaming\Trojan.exe
        "C:\Users\Admin\AppData\Roaming\Trojan.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4844
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Trojan.exe" "Trojan.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:2944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    235KB

    MD5

    c0026d5f463e02bb5aa948af6953a3ab

    SHA1

    60ab29a7d9a9b94d1b810b6ce9f0d153fc7c6f78

    SHA256

    41a6259380a19f0c22045d7c98bd64229fd4894b6d0b1099da70380704a1c769

    SHA512

    a4686b4b903b9364d1fc99587fa187cd889e20290aea5f9a790c2342c822d278bb68ea7f112123582449a89d88ff312578a810b85b3ffb1402ccbf8319b6e531

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    235KB

    MD5

    c0026d5f463e02bb5aa948af6953a3ab

    SHA1

    60ab29a7d9a9b94d1b810b6ce9f0d153fc7c6f78

    SHA256

    41a6259380a19f0c22045d7c98bd64229fd4894b6d0b1099da70380704a1c769

    SHA512

    a4686b4b903b9364d1fc99587fa187cd889e20290aea5f9a790c2342c822d278bb68ea7f112123582449a89d88ff312578a810b85b3ffb1402ccbf8319b6e531

  • C:\Users\Admin\AppData\Roaming\Trojan.exe

    Filesize

    235KB

    MD5

    c0026d5f463e02bb5aa948af6953a3ab

    SHA1

    60ab29a7d9a9b94d1b810b6ce9f0d153fc7c6f78

    SHA256

    41a6259380a19f0c22045d7c98bd64229fd4894b6d0b1099da70380704a1c769

    SHA512

    a4686b4b903b9364d1fc99587fa187cd889e20290aea5f9a790c2342c822d278bb68ea7f112123582449a89d88ff312578a810b85b3ffb1402ccbf8319b6e531

  • C:\Users\Admin\AppData\Roaming\Trojan.exe

    Filesize

    235KB

    MD5

    c0026d5f463e02bb5aa948af6953a3ab

    SHA1

    60ab29a7d9a9b94d1b810b6ce9f0d153fc7c6f78

    SHA256

    41a6259380a19f0c22045d7c98bd64229fd4894b6d0b1099da70380704a1c769

    SHA512

    a4686b4b903b9364d1fc99587fa187cd889e20290aea5f9a790c2342c822d278bb68ea7f112123582449a89d88ff312578a810b85b3ffb1402ccbf8319b6e531

  • memory/3136-135-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-139-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-138-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-140-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-141-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-142-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-143-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-144-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-145-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-146-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-147-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-149-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-150-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-151-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-148-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-153-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-154-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-152-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-155-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-156-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-157-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-158-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-159-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-160-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-162-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-163-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-164-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-161-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-165-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-166-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-167-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-168-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-169-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-170-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-171-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-172-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-173-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-174-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-175-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-176-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-177-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-178-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-179-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-182-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-183-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-181-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-180-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-185-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-186-0x0000000074FD0000-0x0000000075581000-memory.dmp

    Filesize

    5.7MB

  • memory/3136-187-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-184-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-188-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-189-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-190-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-192-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-191-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-193-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-194-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-195-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-197-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-196-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-199-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-198-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB

  • memory/3136-228-0x0000000074FD0000-0x0000000075581000-memory.dmp

    Filesize

    5.7MB

  • memory/4844-239-0x0000000074FD0000-0x0000000075581000-memory.dmp

    Filesize

    5.7MB

  • memory/4844-314-0x0000000074FD0000-0x0000000075581000-memory.dmp

    Filesize

    5.7MB