Analysis

  • max time kernel
    225s
  • max time network
    283s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:47

General

  • Target

    a181986f717715a4b8a39767f023adb834e8f25164e4cf9e7db3ac0abe4759b5.exe

  • Size

    70KB

  • MD5

    2d21290a4ac030e7b7c1f8bb9e36dc52

  • SHA1

    cff38cae60982e275fe78b6c816b2c0207323ea1

  • SHA256

    a181986f717715a4b8a39767f023adb834e8f25164e4cf9e7db3ac0abe4759b5

  • SHA512

    f748abb71715558947dd39c5359cb81420517296c50d58830d51f8245d511e461219a92cbb4a753d3066b83f30ab04814be68d1b86fc2d69cfd606b953bc902d

  • SSDEEP

    1536:jX0JlJNe1BlG+Pve7Bmx+qoDw60loBnmvPFdLujEKX49yQvEpj/Dp:jX0JlqrlfPv8Ix+qoqnNdLuxoyQvEpXp

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a181986f717715a4b8a39767f023adb834e8f25164e4cf9e7db3ac0abe4759b5.exe
    "C:\Users\Admin\AppData\Local\Temp\a181986f717715a4b8a39767f023adb834e8f25164e4cf9e7db3ac0abe4759b5.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Public\scvhost.exe
      "C:\Users\Public\scvhost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4088

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\scvhost.exe

    Filesize

    70KB

    MD5

    2d21290a4ac030e7b7c1f8bb9e36dc52

    SHA1

    cff38cae60982e275fe78b6c816b2c0207323ea1

    SHA256

    a181986f717715a4b8a39767f023adb834e8f25164e4cf9e7db3ac0abe4759b5

    SHA512

    f748abb71715558947dd39c5359cb81420517296c50d58830d51f8245d511e461219a92cbb4a753d3066b83f30ab04814be68d1b86fc2d69cfd606b953bc902d

  • C:\Users\Public\scvhost.exe

    Filesize

    70KB

    MD5

    2d21290a4ac030e7b7c1f8bb9e36dc52

    SHA1

    cff38cae60982e275fe78b6c816b2c0207323ea1

    SHA256

    a181986f717715a4b8a39767f023adb834e8f25164e4cf9e7db3ac0abe4759b5

    SHA512

    f748abb71715558947dd39c5359cb81420517296c50d58830d51f8245d511e461219a92cbb4a753d3066b83f30ab04814be68d1b86fc2d69cfd606b953bc902d

  • memory/2360-132-0x000000001CA70000-0x000000001D4A6000-memory.dmp

    Filesize

    10.2MB

  • memory/2360-133-0x0000000001A5A000-0x0000000001A5F000-memory.dmp

    Filesize

    20KB

  • memory/2360-138-0x0000000001A5A000-0x0000000001A5F000-memory.dmp

    Filesize

    20KB

  • memory/2360-141-0x0000000001A5A000-0x0000000001A5F000-memory.dmp

    Filesize

    20KB

  • memory/4088-134-0x0000000000000000-mapping.dmp

  • memory/4088-137-0x000000001C520000-0x000000001CF56000-memory.dmp

    Filesize

    10.2MB

  • memory/4088-139-0x000000000150A000-0x000000000150F000-memory.dmp

    Filesize

    20KB

  • memory/4088-140-0x000000000150A000-0x000000000150F000-memory.dmp

    Filesize

    20KB