Analysis

  • max time kernel
    187s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:46

General

  • Target

    79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe

  • Size

    172KB

  • MD5

    60a7a8b1c78cb2ed4becd00a6456dbc8

  • SHA1

    09bd14a2853b5f5a8babbdd552a4953c43c2f483

  • SHA256

    79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56

  • SHA512

    09b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6

  • SSDEEP

    3072:iJ0A2KvUXh9O5P908zsStvqeSwCKx83lUICxsqcAeSQ:i0A2auu10usSJbuKxAlicbS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe
    "C:\Users\Admin\AppData\Local\Temp\79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5004
    • C:\Windows\temp\svchost.exe
      "C:\Windows\temp\svchost.exe" -install
      2⤵
      • Executes dropped EXE
      PID:3640
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\~0.bat" "
      2⤵
        PID:5008
    • C:\Windows\temp\svchost.exe
      C:\Windows\temp\svchost.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5080

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~0.bat

      Filesize

      258B

      MD5

      a9d9e7069fee2197452e6bfdd806e851

      SHA1

      0ce3a2040fce0a3f7dfc0f4ec5a6c66240063c12

      SHA256

      8e0e0f2c1b3df7f15def6cc9e9e0735e75fb9e5952e33a103c65f6e12d8ab151

      SHA512

      440a8f8e201080e759aa407577b8c36467aad5d7edb0d4bfe7a05a8bc7466c096113e47b32dfc660b3e8112889cf51e881ae31fe760b39b78459af4cad18a03d

    • C:\Windows\Temp\svchost.exe

      Filesize

      172KB

      MD5

      60a7a8b1c78cb2ed4becd00a6456dbc8

      SHA1

      09bd14a2853b5f5a8babbdd552a4953c43c2f483

      SHA256

      79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56

      SHA512

      09b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6

    • C:\Windows\Temp\svchost.exe

      Filesize

      172KB

      MD5

      60a7a8b1c78cb2ed4becd00a6456dbc8

      SHA1

      09bd14a2853b5f5a8babbdd552a4953c43c2f483

      SHA256

      79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56

      SHA512

      09b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6

    • C:\Windows\temp\svchost.exe

      Filesize

      172KB

      MD5

      60a7a8b1c78cb2ed4becd00a6456dbc8

      SHA1

      09bd14a2853b5f5a8babbdd552a4953c43c2f483

      SHA256

      79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56

      SHA512

      09b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6

    • memory/3640-132-0x0000000000000000-mapping.dmp

    • memory/5008-136-0x0000000000000000-mapping.dmp