Analysis

  • max time kernel
    90s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 18:58

General

  • Target

    03c577476a0cfe37683beb7551277de93cb85d6397b884eefc6ffd2947b35760.exe

  • Size

    234KB

  • MD5

    0f1f3ef47fe66f511d620dd785c2d6a3

  • SHA1

    8b82e4f533bee4f07fa466f64dc47945fb3a4694

  • SHA256

    03c577476a0cfe37683beb7551277de93cb85d6397b884eefc6ffd2947b35760

  • SHA512

    07d1b989ab091a50575dcd912ee8af4bb85a40f5e3db686f27b2b8a6036a71140d6a5b28ff125d0afc549686728af4c8560f904ae6ab231eefa449d5cd6bf5af

  • SSDEEP

    3072:n2TcFR/7qAN5vXgteGrwv8MT724/ORPuXAozjYA2kmiK:2I9qUkeGsbkA2NiK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03c577476a0cfe37683beb7551277de93cb85d6397b884eefc6ffd2947b35760.exe
    "C:\Users\Admin\AppData\Local\Temp\03c577476a0cfe37683beb7551277de93cb85d6397b884eefc6ffd2947b35760.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3376
    • C:\Windows\killa.exe
      "C:\Windows\killa.exe" 2C:\Users\Admin\AppData\Local\Temp\03c577476a0cfe37683beb7551277de93cb85d6397b884eefc6ffd2947b35760.exe
      2⤵
      • Executes dropped EXE
      PID:3716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\killa.exe

    Filesize

    234KB

    MD5

    0f1f3ef47fe66f511d620dd785c2d6a3

    SHA1

    8b82e4f533bee4f07fa466f64dc47945fb3a4694

    SHA256

    03c577476a0cfe37683beb7551277de93cb85d6397b884eefc6ffd2947b35760

    SHA512

    07d1b989ab091a50575dcd912ee8af4bb85a40f5e3db686f27b2b8a6036a71140d6a5b28ff125d0afc549686728af4c8560f904ae6ab231eefa449d5cd6bf5af

  • C:\Windows\killa.exe

    Filesize

    234KB

    MD5

    0f1f3ef47fe66f511d620dd785c2d6a3

    SHA1

    8b82e4f533bee4f07fa466f64dc47945fb3a4694

    SHA256

    03c577476a0cfe37683beb7551277de93cb85d6397b884eefc6ffd2947b35760

    SHA512

    07d1b989ab091a50575dcd912ee8af4bb85a40f5e3db686f27b2b8a6036a71140d6a5b28ff125d0afc549686728af4c8560f904ae6ab231eefa449d5cd6bf5af