Analysis

  • max time kernel
    162s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 10:35

General

  • Target

    c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe

  • Size

    100KB

  • MD5

    0d5a6faadb05d882b42df36002ecea00

  • SHA1

    7d5d7fedd8121fefe4d2ec06acff374fb990a7bf

  • SHA256

    c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d

  • SHA512

    5b28b9a6ab9407fcac4a7c022794555703199babed6dfed5370894cd7417ed42f04baeb24ebe2d710b98906871e31d8d78460c382bcc69f9ddd31aba266d65af

  • SSDEEP

    1536:QbWJH5M6CzfUOQKmy0IYf8Yj9Qf5YcZ6QBoJug8bdc:QbWJZM/U1KmrId84ucZ6go0g8bdc

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe
    "C:\Users\Admin\AppData\Local\Temp\c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Windows\winlogon.exe
      "C:\Windows\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\winlogon.exe
        "C:\Windows\winlogon.exe"
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Checks computer location settings
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5024
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\I-87497009.bat" "
          4⤵
            PID:4656
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\U-87497009.bat" "
            4⤵
              PID:448
          • C:\Users\Admin\AppData\Roaming\csrss.exe
            "C:\Users\Admin\AppData\Roaming\csrss.exe" -keyhide -prochide 5024
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4576

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\I-87497009.bat

        Filesize

        23B

        MD5

        97aae1211f3a9c7ecd8531ee87ed5354

        SHA1

        3cec50b07d80bb054e90458d795e9867ba678851

        SHA256

        8668f8216a6e5ab8ff1fb5d4ad886ba768c843eb98394cd260d53e8ed4fbc145

        SHA512

        0fd8e9b2eb6a92794b569b7a29ff6609e81e1bb90ef2cb58cec29cf6c37b32fd82879ad24a1a7fef0ade0c6a8a3a1a7b7d7b7171e0c36cfac0b24df52aba6f1e

      • C:\Users\Admin\AppData\Local\Temp\U-87497009.bat

        Filesize

        148B

        MD5

        f9306f9e4a6883db6b5a1d4b193a5bfe

        SHA1

        e906f67cdba667ceef9ac67930e29358fa696fe9

        SHA256

        254752c9726228c0109a77990a75c423b07c57b7be9162e99526d9d55db7b80f

        SHA512

        c5e37d3440e8beaf5062f967d38ca27c9624cb8627afaf909d0c5751634cd849d1438d2f54c39b3df8271d6c3b812e86d72e21290b71a0bf52511e1ccd818578

      • C:\Users\Admin\AppData\Roaming\csrss.exe

        Filesize

        100KB

        MD5

        0d5a6faadb05d882b42df36002ecea00

        SHA1

        7d5d7fedd8121fefe4d2ec06acff374fb990a7bf

        SHA256

        c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d

        SHA512

        5b28b9a6ab9407fcac4a7c022794555703199babed6dfed5370894cd7417ed42f04baeb24ebe2d710b98906871e31d8d78460c382bcc69f9ddd31aba266d65af

      • C:\Users\Admin\AppData\Roaming\csrss.exe

        Filesize

        100KB

        MD5

        0d5a6faadb05d882b42df36002ecea00

        SHA1

        7d5d7fedd8121fefe4d2ec06acff374fb990a7bf

        SHA256

        c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d

        SHA512

        5b28b9a6ab9407fcac4a7c022794555703199babed6dfed5370894cd7417ed42f04baeb24ebe2d710b98906871e31d8d78460c382bcc69f9ddd31aba266d65af

      • C:\Windows\winlogon.exe

        Filesize

        100KB

        MD5

        0d5a6faadb05d882b42df36002ecea00

        SHA1

        7d5d7fedd8121fefe4d2ec06acff374fb990a7bf

        SHA256

        c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d

        SHA512

        5b28b9a6ab9407fcac4a7c022794555703199babed6dfed5370894cd7417ed42f04baeb24ebe2d710b98906871e31d8d78460c382bcc69f9ddd31aba266d65af

      • C:\Windows\winlogon.exe

        Filesize

        100KB

        MD5

        0d5a6faadb05d882b42df36002ecea00

        SHA1

        7d5d7fedd8121fefe4d2ec06acff374fb990a7bf

        SHA256

        c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d

        SHA512

        5b28b9a6ab9407fcac4a7c022794555703199babed6dfed5370894cd7417ed42f04baeb24ebe2d710b98906871e31d8d78460c382bcc69f9ddd31aba266d65af

      • C:\Windows\winlogon.exe

        Filesize

        100KB

        MD5

        0d5a6faadb05d882b42df36002ecea00

        SHA1

        7d5d7fedd8121fefe4d2ec06acff374fb990a7bf

        SHA256

        c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d

        SHA512

        5b28b9a6ab9407fcac4a7c022794555703199babed6dfed5370894cd7417ed42f04baeb24ebe2d710b98906871e31d8d78460c382bcc69f9ddd31aba266d65af

      • memory/1448-132-0x00000000747D0000-0x0000000074D81000-memory.dmp

        Filesize

        5.7MB

      • memory/1448-151-0x00000000747D0000-0x0000000074D81000-memory.dmp

        Filesize

        5.7MB

      • memory/1448-133-0x00000000747D0000-0x0000000074D81000-memory.dmp

        Filesize

        5.7MB

      • memory/2880-137-0x00000000747D0000-0x0000000074D81000-memory.dmp

        Filesize

        5.7MB

      • memory/2880-150-0x00000000747D0000-0x0000000074D81000-memory.dmp

        Filesize

        5.7MB

      • memory/4576-158-0x00000000747D0000-0x0000000074D81000-memory.dmp

        Filesize

        5.7MB

      • memory/4576-152-0x00000000747D0000-0x0000000074D81000-memory.dmp

        Filesize

        5.7MB

      • memory/5024-146-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/5024-145-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/5024-144-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/5024-141-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/5024-156-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/5024-140-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/5024-139-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB