Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2022, 03:25

General

  • Target

    65b763aad0dd4ce896633c44e1ecdc68a3b02448ed0d4c9df8f4f5fbd8012c5d.exe

  • Size

    1.7MB

  • MD5

    2f8818720cd7e37f57e22869803c8ec6

  • SHA1

    f5824d0bb8827d4e53b7967f054fc6a3414b09fc

  • SHA256

    65b763aad0dd4ce896633c44e1ecdc68a3b02448ed0d4c9df8f4f5fbd8012c5d

  • SHA512

    201378bb521ca7c0d75831c94d1afbdbfbbbedce0375887a6cc775777d9afa02ba118fda2aecdc9312dc66a79d690cc027bb873fed889f725e75cc2c72354bce

  • SSDEEP

    49152:4unfBJta0Slsp0TccLVPjFasQ2SejqE+Uz1h:4KfBJqS2TceJhaskUz1h

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65b763aad0dd4ce896633c44e1ecdc68a3b02448ed0d4c9df8f4f5fbd8012c5d.exe
    "C:\Users\Admin\AppData\Local\Temp\65b763aad0dd4ce896633c44e1ecdc68a3b02448ed0d4c9df8f4f5fbd8012c5d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" .\ORB7qov.BI -U -S
      2⤵
      • Loads dropped DLL
      PID:2708

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ORB7qov.BI

          Filesize

          1.7MB

          MD5

          a9d91c5c320f515793506a7b1dc8b63a

          SHA1

          2d7dcc156541f9b39eacd12fdae7010ed280d51f

          SHA256

          e288d2abd42a105cc6cd02a3bde35fcb55e67d851935c88ebf34ef0f6b63a1a2

          SHA512

          0054d1cd7238b8ba4350cc9cb5791f553d1c684b8fef8dac39b6e570ef5f1daa7b56e8a110c2514777aa00a7cc80be84f2db4acbe0fddd7420d1b42f4b845891

        • C:\Users\Admin\AppData\Local\Temp\ORB7qov.bI

          Filesize

          1.7MB

          MD5

          a9d91c5c320f515793506a7b1dc8b63a

          SHA1

          2d7dcc156541f9b39eacd12fdae7010ed280d51f

          SHA256

          e288d2abd42a105cc6cd02a3bde35fcb55e67d851935c88ebf34ef0f6b63a1a2

          SHA512

          0054d1cd7238b8ba4350cc9cb5791f553d1c684b8fef8dac39b6e570ef5f1daa7b56e8a110c2514777aa00a7cc80be84f2db4acbe0fddd7420d1b42f4b845891

        • memory/2708-136-0x0000000003280000-0x0000000003392000-memory.dmp

          Filesize

          1.1MB

        • memory/2708-135-0x0000000003030000-0x0000000003168000-memory.dmp

          Filesize

          1.2MB

        • memory/2708-137-0x00000000033A0000-0x000000000346B000-memory.dmp

          Filesize

          812KB

        • memory/2708-138-0x0000000003470000-0x0000000003527000-memory.dmp

          Filesize

          732KB

        • memory/2708-141-0x0000000003280000-0x0000000003392000-memory.dmp

          Filesize

          1.1MB