Analysis

  • max time kernel
    175s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 07:17

General

  • Target

    a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe

  • Size

    115KB

  • MD5

    f83811baceb47fee0563fc1b91f9e97f

  • SHA1

    c8b2a2151803e3596d102bee8e518f21c5d3d852

  • SHA256

    a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1

  • SHA512

    03cc94e8c2cecd4e8244dc6ffb1b23aa31c40ef24460e0276531e61a109789cc9efe7d41afca41f59a16256cef79629eaa1c54ec6dd85d507b34a4027cd34123

  • SSDEEP

    3072:cU143UTXqhlYDnU/+FpwXmR7Iq2+YlbWa3rdWuLqfUl:nXqfE7wX82ZLqfU

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe
    "C:\Users\Admin\AppData\Local\Temp\a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      PID:3012

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3012-132-0x0000000000000000-mapping.dmp