Analysis

  • max time kernel
    91s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 20:20

General

  • Target

    525c54768d9fb600dfbc477b793c6d5442890da2c80f08056f24ab825a518ef2.exe

  • Size

    196KB

  • MD5

    0ddc2605d02cb523d09447dba347b9b0

  • SHA1

    f61c533644d71051063d92e56cab3147a0868ee3

  • SHA256

    525c54768d9fb600dfbc477b793c6d5442890da2c80f08056f24ab825a518ef2

  • SHA512

    3803203320ef9dae5d01a86f7b084675dd38171398744780d49159c1fb84573010b0962b8e463eec71b00f53957e9e838b10ca489ec698d829d96f2739430b84

  • SSDEEP

    3072:jvCgNn/vIsb9fQ02WR5fsKeEAStZeEiN/jshzUnMPzQtOq/RcGCH:D/vIsQ02atLtZetZsdzu/b

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\525c54768d9fb600dfbc477b793c6d5442890da2c80f08056f24ab825a518ef2.exe
    "C:\Users\Admin\AppData\Local\Temp\525c54768d9fb600dfbc477b793c6d5442890da2c80f08056f24ab825a518ef2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Users\Admin\AppData\Local\Temp\OIOpXy.exe
      C:\Users\Admin\AppData\Local\Temp\OIOpXy.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\17212b32.bat" "
        3⤵
          PID:3968

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\17212b32.bat

      Filesize

      187B

      MD5

      153cc1e802ba0ac603b0199b2c60a641

      SHA1

      6976c5c34c7e7d3245443c4c2607403f938eaa66

      SHA256

      f35bf7aa36f3d580e3098e85c82a1524b0729cacf0c127492f407dd5f6f766c4

      SHA512

      c5ee86b90aeaf424c7e168b7386adc9dd687e397ba104e623cbbc7d63bb05bb013cd6595fbf478b9370f7c159629514bd8e3dcb0abdb7593d3ff977df7678f20

    • C:\Users\Admin\AppData\Local\Temp\OIOpXy.exe

      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • C:\Users\Admin\AppData\Local\Temp\OIOpXy.exe

      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • memory/1316-132-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1316-140-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4316-136-0x0000000000180000-0x0000000000189000-memory.dmp

      Filesize

      36KB

    • memory/4316-138-0x0000000000180000-0x0000000000189000-memory.dmp

      Filesize

      36KB