Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 20:20

General

  • Target

    4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9.exe

  • Size

    44KB

  • MD5

    2001efe468016abc4b728ccd40ddd0c0

  • SHA1

    4e0351f76fa17d792e47f6ba639a9c87da5fd90f

  • SHA256

    4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9

  • SHA512

    459dd75c9f64d40618887c7387357d5efecee1a3302d02f59c9f76591b39d1b791cb9495cacbad748cdc554b08d5d5d3a79ddf1365827b8f14e956c4215d2c2e

  • SSDEEP

    768:2USW61K57IIfWAQGPL4vzZq2o9W7GsxBbPr:2q6JAWLGCq2iW7z

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9.exe
    "C:\Users\Admin\AppData\Local\Temp\4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\cyIfzL.exe
      C:\Users\Admin\AppData\Local\Temp\cyIfzL.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0cf10eb3.bat" "
        3⤵
          PID:1020

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\0cf10eb3.bat

            Filesize

            187B

            MD5

            937e2b144c75c8888fa4ab933328d309

            SHA1

            7694b52bfcc9f243471b8168f92c4558c1eda654

            SHA256

            c633cdcff8f1c217f61212f2cda63cc03ce36bcb3590c5318658fd6a12f4aff3

            SHA512

            5bab7149a674d28fc4ced0e2f2f17f2f3094dbcfaa8e5fb8dc200eb2a29e24aee8ff14d2d791aac74f2b847bb593219fdc6368a6fd0832aaaa5ee4be185a2799

          • C:\Users\Admin\AppData\Local\Temp\cyIfzL.exe

            Filesize

            15KB

            MD5

            56b2c3810dba2e939a8bb9fa36d3cf96

            SHA1

            99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

            SHA256

            4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

            SHA512

            27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

          • C:\Users\Admin\AppData\Local\Temp\cyIfzL.exe

            Filesize

            15KB

            MD5

            56b2c3810dba2e939a8bb9fa36d3cf96

            SHA1

            99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

            SHA256

            4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

            SHA512

            27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

          • memory/2180-136-0x0000000000030000-0x0000000000039000-memory.dmp

            Filesize

            36KB

          • memory/2180-138-0x0000000000030000-0x0000000000039000-memory.dmp

            Filesize

            36KB

          • memory/2372-132-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2372-140-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB