Analysis

  • max time kernel
    153s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:03

General

  • Target

    01ba32d9f7971cc4a9d4c54a8b292ba503a97aa9316aff60cb92fe830c043e11.exe

  • Size

    2.8MB

  • MD5

    d37a5711036b4836680b1b7a4c5ed776

  • SHA1

    bbf53ad54bff5dc0d467b1ae10eb86c733fa5a62

  • SHA256

    01ba32d9f7971cc4a9d4c54a8b292ba503a97aa9316aff60cb92fe830c043e11

  • SHA512

    a05d194a606024d7b22e0b85ea865e71f4577f4e437d199a04e63212f7750382f682b83ef6fe892f2d243d7466cf89091b423da14a759b130922aac5badc7db8

  • SSDEEP

    49152:SUic3k5iisbhVYGoXXHvzTa8Kril+QE0agTm/0Yi1EGllkdXeHDAjCpduZ7466gJ:SUiV5iLzoHv/lvl+QIga/0YiaWQeHDAd

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 21 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 6 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01ba32d9f7971cc4a9d4c54a8b292ba503a97aa9316aff60cb92fe830c043e11.exe
    "C:\Users\Admin\AppData\Local\Temp\01ba32d9f7971cc4a9d4c54a8b292ba503a97aa9316aff60cb92fe830c043e11.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_ms0469.bat" "C:\Users\Admin\AppData\Local\Temp\01ba32d9f7971cc4a9d4c54a8b292ba503a97aa9316aff60cb92fe830c043e11.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3868
      • C:\Users\Admin\AppData\Local\Temp\01ba32d9f7971cc4a9d4c54a8b292ba503a97aa9316aff60cb92fe830c043e11.exe
        "C:\Users\Admin\AppData\Local\Temp\01ba32d9f7971cc4a9d4c54a8b292ba503a97aa9316aff60cb92fe830c043e11.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4508
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      C:\Users\Admin\AppData\Local\Temp\file.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\7BBC.dll",ADB_Release
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Modifies system certificate store
        PID:2372
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\25B9.bat" "
        3⤵
          PID:3544

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\01ba32d9f7971cc4a9d4c54a8b292ba503a97aa9316aff60cb92fe830c043e11.exe
      Filesize

      2.4MB

      MD5

      4150d25bf2c47cd3ed7a0d3e67f39a40

      SHA1

      37bd0df3068703afa9915e8477b6c4e22a52080d

      SHA256

      85b3a2291800b8f5c905cfa321f4ea1b54250f952fb774a11c24916fc4d80fb0

      SHA512

      1c2d2f78a50bd7311f41773a54f2c67a7a9080276887591ad62b8b0d026a1909c20f65be6ca09c6ea20dec8361493a94b487a019a417f61228fe519966d283ce

    • C:\Users\Admin\AppData\Local\Temp\01ba32d9f7971cc4a9d4c54a8b292ba503a97aa9316aff60cb92fe830c043e11.exe
      Filesize

      2.4MB

      MD5

      4150d25bf2c47cd3ed7a0d3e67f39a40

      SHA1

      37bd0df3068703afa9915e8477b6c4e22a52080d

      SHA256

      85b3a2291800b8f5c905cfa321f4ea1b54250f952fb774a11c24916fc4d80fb0

      SHA512

      1c2d2f78a50bd7311f41773a54f2c67a7a9080276887591ad62b8b0d026a1909c20f65be6ca09c6ea20dec8361493a94b487a019a417f61228fe519966d283ce

    • C:\Users\Admin\AppData\Local\Temp\25B9.bat
      Filesize

      139B

      MD5

      61dcfebf0bbffa0d053fcdbaf944b1de

      SHA1

      026ddacd88b63f261b42cac0d420fc09c423ea80

      SHA256

      244f004ec32da92d3c4282a20d92f4b7ab43ae5d42bbda0dbdd84664579577e4

      SHA512

      f6848e2bcba1b4867f3617207b444d57705354c1c17e0aa216cf16975e31f0312b030094029f4199591bbc5bdcf324d4e7a55f3169cb6c68c95099ab2f4ec0bb

    • C:\Users\Admin\AppData\Local\Temp\7BBC.dll
      Filesize

      123KB

      MD5

      c8eb6040fd02d77660d19057a38ff769

      SHA1

      b491c14d8cfb48636f6095b7b16555e9a575d57f

      SHA256

      366affd094cc63e2c19c5d57a6866b487889dab5d1b07c084fff94262d8a390b

      SHA512

      36d8bc7f18bbb62cfaf012a1e0539301d7eb1104b2f3bd79025f72e2a8f688e8d2b20f229253f8d387e25cb67f60e4306b6dab2b7e054f439c1a750bec896e56

    • C:\Users\Admin\AppData\Local\Temp\7BBC.dll
      Filesize

      123KB

      MD5

      c8eb6040fd02d77660d19057a38ff769

      SHA1

      b491c14d8cfb48636f6095b7b16555e9a575d57f

      SHA256

      366affd094cc63e2c19c5d57a6866b487889dab5d1b07c084fff94262d8a390b

      SHA512

      36d8bc7f18bbb62cfaf012a1e0539301d7eb1104b2f3bd79025f72e2a8f688e8d2b20f229253f8d387e25cb67f60e4306b6dab2b7e054f439c1a750bec896e56

    • C:\Users\Admin\AppData\Local\Temp\SurfAnonymousFree-2.4.0.8.Setup.exe.org
      Filesize

      2.4MB

      MD5

      4150d25bf2c47cd3ed7a0d3e67f39a40

      SHA1

      37bd0df3068703afa9915e8477b6c4e22a52080d

      SHA256

      85b3a2291800b8f5c905cfa321f4ea1b54250f952fb774a11c24916fc4d80fb0

      SHA512

      1c2d2f78a50bd7311f41773a54f2c67a7a9080276887591ad62b8b0d026a1909c20f65be6ca09c6ea20dec8361493a94b487a019a417f61228fe519966d283ce

    • C:\Users\Admin\AppData\Local\Temp\_ms0469.bat
      Filesize

      270B

      MD5

      e183853960c090642ac533bdf0512f4e

      SHA1

      33fa2f0c3a71f7ae950904d1eb14079d3dabb3fa

      SHA256

      a9f7b909a3791dff8583f5ef2ca8e8c2982ece74928dc6d54d82e3610f532223

      SHA512

      01b1e666d61b24ede1f9a667a64be2f1268d62f88111e2fb4899e92d6edf029d057bef6e66578f7a6e3efee139736c33c5c6e1e6424223f061dfd38ddb3c7dde

    • C:\Users\Admin\AppData\Local\Temp\file.exe
      Filesize

      214KB

      MD5

      28f96a57fa5ff663926e9bad51a1d0cb

      SHA1

      a75995f94854dea8799650a2f4a97980b71199d2

      SHA256

      19972cc87c7653aff9620461ce459b996b1f9b030d7c8031df0c8265b73f670d

      SHA512

      104a8be2c460f73ac953711f677c8666b5831bebd64ec01b722c14270f4ceaef1f3564b00006f47bb25c42f67137d746b72be57e3d2bcb9bd98908784ef3339b

    • C:\Users\Admin\AppData\Local\Temp\file.exe
      Filesize

      214KB

      MD5

      28f96a57fa5ff663926e9bad51a1d0cb

      SHA1

      a75995f94854dea8799650a2f4a97980b71199d2

      SHA256

      19972cc87c7653aff9620461ce459b996b1f9b030d7c8031df0c8265b73f670d

      SHA512

      104a8be2c460f73ac953711f677c8666b5831bebd64ec01b722c14270f4ceaef1f3564b00006f47bb25c42f67137d746b72be57e3d2bcb9bd98908784ef3339b

    • C:\Users\Admin\AppData\Local\Temp\nsj77E1.tmp\InstallOptions.dll
      Filesize

      14KB

      MD5

      ec48a8204e1aed3d9a951cd92158cbe3

      SHA1

      0db29522e15448553b697b88b31a3d8392efd933

      SHA256

      3166399ed2ee296749aa412a4ec70807373b6349e9b94a7fcd97c3418f744f0f

      SHA512

      9b0ab63fbe4bf89ddf93e5fc6922cc95c0586e21dea945ce04065afd7957bd2472e34c909d356123346f62dee4c6d6077a0072810c91b61ad3df4c168cdb79d5

    • memory/1744-133-0x0000000000000000-mapping.dmp
    • memory/2372-138-0x0000000000000000-mapping.dmp
    • memory/3544-142-0x0000000000000000-mapping.dmp
    • memory/3868-132-0x0000000000000000-mapping.dmp
    • memory/4508-139-0x0000000000000000-mapping.dmp