Analysis

  • max time kernel
    90s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:39

General

  • Target

    df5b3d584402d88d19ff0dcd3ed1879c51d640bbf0eb6f38368322640ecfb452.exe

  • Size

    717KB

  • MD5

    9fe8f0d5bd98fd5b7eaddece52c99972

  • SHA1

    5134ea4a5494bed1184f34e7586f950e8c958855

  • SHA256

    df5b3d584402d88d19ff0dcd3ed1879c51d640bbf0eb6f38368322640ecfb452

  • SHA512

    33536e5bebfc5240031ac362e1a9ce47ade064c4d5057b156e805a8a1266586a37ea46e06929b0ea65837c3cce3af9d117f81693d9a8884aceea5cf55f55117e

  • SSDEEP

    6144:BEhzURIw1IHVseT2hUFj8Xvqpj1i3KWF1iGqBhel3uq8CJVU7Q1pFknM+VWxASBb:fmHy+Fj8XvZZUazkM4WxAYIQG7IIA

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df5b3d584402d88d19ff0dcd3ed1879c51d640bbf0eb6f38368322640ecfb452.exe
    "C:\Users\Admin\AppData\Local\Temp\df5b3d584402d88d19ff0dcd3ed1879c51d640bbf0eb6f38368322640ecfb452.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Users\Admin\AppData\Local\Temp\df5b3d584402d88d19ff0dcd3ed1879c51d640bbf0eb6f38368322640ecfb452.exe
      C:\Users\Admin\AppData\Local\Temp\df5b3d584402d88d19ff0dcd3ed1879c51d640bbf0eb6f38368322640ecfb452.exe
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3124
      • C:\Users\Admin\AppData\Local\Temp\window.exe
        "C:\Users\Admin\AppData\Local\Temp\window.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5040
        • C:\Users\Admin\AppData\Local\Temp\window.exe
          C:\Users\Admin\AppData\Local\Temp\window.exe
          4⤵
          • Executes dropped EXE
          PID:1672
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 80
            5⤵
            • Program crash
            PID:3136
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1672 -ip 1672
    1⤵
      PID:1956

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\df5b3d584402d88d19ff0dcd3ed1879c51d640bbf0eb6f38368322640ecfb452.exe.log
      Filesize

      490B

      MD5

      1935da62f49edb1990d678f35905abb6

      SHA1

      cae50f2db795eb457f33e514e7ebc2fa78c41520

      SHA256

      375f90dd859c71cf1c5838700c0aac102590727f2a69b5ea37d30f7bffefc802

      SHA512

      52c5540b8021ac4eb7bf960d4aba9d3b80b4ca023afbc18e574b013e18edff4dc3d01d5e1370aa8d38a3659ce15bdb47601c9bc78eac8666d781ff75e5a7fe00

    • C:\Users\Admin\AppData\Local\Temp\window.exe
      Filesize

      717KB

      MD5

      9fe8f0d5bd98fd5b7eaddece52c99972

      SHA1

      5134ea4a5494bed1184f34e7586f950e8c958855

      SHA256

      df5b3d584402d88d19ff0dcd3ed1879c51d640bbf0eb6f38368322640ecfb452

      SHA512

      33536e5bebfc5240031ac362e1a9ce47ade064c4d5057b156e805a8a1266586a37ea46e06929b0ea65837c3cce3af9d117f81693d9a8884aceea5cf55f55117e

    • C:\Users\Admin\AppData\Local\Temp\window.exe
      Filesize

      717KB

      MD5

      9fe8f0d5bd98fd5b7eaddece52c99972

      SHA1

      5134ea4a5494bed1184f34e7586f950e8c958855

      SHA256

      df5b3d584402d88d19ff0dcd3ed1879c51d640bbf0eb6f38368322640ecfb452

      SHA512

      33536e5bebfc5240031ac362e1a9ce47ade064c4d5057b156e805a8a1266586a37ea46e06929b0ea65837c3cce3af9d117f81693d9a8884aceea5cf55f55117e

    • C:\Users\Admin\AppData\Local\Temp\window.exe
      Filesize

      717KB

      MD5

      9fe8f0d5bd98fd5b7eaddece52c99972

      SHA1

      5134ea4a5494bed1184f34e7586f950e8c958855

      SHA256

      df5b3d584402d88d19ff0dcd3ed1879c51d640bbf0eb6f38368322640ecfb452

      SHA512

      33536e5bebfc5240031ac362e1a9ce47ade064c4d5057b156e805a8a1266586a37ea46e06929b0ea65837c3cce3af9d117f81693d9a8884aceea5cf55f55117e

    • memory/1672-142-0x0000000000000000-mapping.dmp
    • memory/3124-141-0x0000000074AC0000-0x0000000075071000-memory.dmp
      Filesize

      5.7MB

    • memory/3124-138-0x0000000074AC0000-0x0000000075071000-memory.dmp
      Filesize

      5.7MB

    • memory/3124-132-0x0000000000000000-mapping.dmp
    • memory/3124-133-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/5040-137-0x0000000000000000-mapping.dmp
    • memory/5040-145-0x0000000074AC0000-0x0000000075071000-memory.dmp
      Filesize

      5.7MB

    • memory/5060-136-0x0000000074AC0000-0x0000000075071000-memory.dmp
      Filesize

      5.7MB

    • memory/5060-134-0x0000000074AC0000-0x0000000075071000-memory.dmp
      Filesize

      5.7MB