Analysis

  • max time kernel
    340s
  • max time network
    387s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:07

General

  • Target

    af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2.exe

  • Size

    1.6MB

  • MD5

    49b109aa33b67e7575502167cafc3ee4

  • SHA1

    95b8cc269544c16a3cddf7c3c2c02faa2ab2270e

  • SHA256

    af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2

  • SHA512

    172f7320d97ccc8e9777dc053c4896bedb913de608541eff74423ea64c7d287675baf2a62c97e997729906171cfbb23e1d804fe5e56d8bd174366f3c82a6a562

  • SSDEEP

    24576:b062cSEk8zNlLBtW/BXgJWNnh5F9UPdxVi3wJZiTPEYZe6RWJLODQtcHNSuxd3f+:A6PaYWJXzNnhDisAJZiwYZvQpu/vz/i

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2.exe
    "C:\Users\Admin\AppData\Local\Temp\af3ca376589dab19ace552686b1bdb65badd901e19074fda3cdf1ffd86c92ef2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" .\XM46.8S
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\XM46.8S
        3⤵
        • Loads dropped DLL
        PID:2080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\XM46.8S

    Filesize

    1.7MB

    MD5

    2d651abc49d33447713b0fd34f221ae8

    SHA1

    a20738055f2e9e14baec621d9c0f2fee612414ed

    SHA256

    631576338236d320ffffe02311493bad49605b5b93fe7a227888553de26ee35b

    SHA512

    d37ad62467e3bfb0aa39c8e593b53453f4f69868cc5e5f40256d96809410921171edb8882d0749d763538c5ef9a48ffaff7d59da48e8c9412abc856115a17c1e

  • C:\Users\Admin\AppData\Local\Temp\xM46.8s

    Filesize

    1.7MB

    MD5

    2d651abc49d33447713b0fd34f221ae8

    SHA1

    a20738055f2e9e14baec621d9c0f2fee612414ed

    SHA256

    631576338236d320ffffe02311493bad49605b5b93fe7a227888553de26ee35b

    SHA512

    d37ad62467e3bfb0aa39c8e593b53453f4f69868cc5e5f40256d96809410921171edb8882d0749d763538c5ef9a48ffaff7d59da48e8c9412abc856115a17c1e

  • memory/2080-133-0x0000000000000000-mapping.dmp

  • memory/2080-136-0x0000000002D60000-0x0000000002E9B000-memory.dmp

    Filesize

    1.2MB

  • memory/2080-137-0x0000000002FC0000-0x00000000030D5000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-138-0x0000000002D60000-0x0000000002E9B000-memory.dmp

    Filesize

    1.2MB

  • memory/3452-132-0x0000000000000000-mapping.dmp