Analysis

  • max time kernel
    137s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:52

General

  • Target

    2a46f751b86df95b5f740d4e0b3129d26b6323bb9afe6a1707519ce2bb90e5e6.exe

  • Size

    18KB

  • MD5

    8dcafbce7a944df17e8257eaa3dc7e99

  • SHA1

    2b1ff918a5611abbc21638b8334f399984e468cd

  • SHA256

    2a46f751b86df95b5f740d4e0b3129d26b6323bb9afe6a1707519ce2bb90e5e6

  • SHA512

    5e16962074dbdcb4ba3c16fd6fa9a9324832dc38fb7efd2b5fd8df087b4f100ad2b21149e56535c5624af41e047eab840e8683bf9ee11f21be4cda9bba765a2f

  • SSDEEP

    192:KSY39YVDBpWvsmYaaBIyFE2vO0c93ymCzyLq1oynR61miLE3epar8Rd/:C39YVDLnmY1RTQ938zQq1+wiL8e68Rd

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a46f751b86df95b5f740d4e0b3129d26b6323bb9afe6a1707519ce2bb90e5e6.exe
    "C:\Users\Admin\AppData\Local\Temp\2a46f751b86df95b5f740d4e0b3129d26b6323bb9afe6a1707519ce2bb90e5e6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\pycwq.exe
      "C:\Users\Admin\AppData\Local\Temp\pycwq.exe"
      2⤵
      • Executes dropped EXE
      PID:2276

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pycwq.exe
    Filesize

    18KB

    MD5

    2789ee4f393557184b5790214cdd7d64

    SHA1

    4d9f739b3edcb2654ba2defe72b677533c43f6b2

    SHA256

    6bfcc1ee7ee701107fdef87c08eedfa3d65ad6e0706adf311e518330f6468da8

    SHA512

    fc354ed4566896331a5956a4d7c9f945389a778bbab50ba96d669fead7de81570f625bb8ac8043f76e6cc4a71e801dc0ccf171b5720dacdccafc1e7f2b6acd3d

  • C:\Users\Admin\AppData\Local\Temp\pycwq.exe
    Filesize

    18KB

    MD5

    2789ee4f393557184b5790214cdd7d64

    SHA1

    4d9f739b3edcb2654ba2defe72b677533c43f6b2

    SHA256

    6bfcc1ee7ee701107fdef87c08eedfa3d65ad6e0706adf311e518330f6468da8

    SHA512

    fc354ed4566896331a5956a4d7c9f945389a778bbab50ba96d669fead7de81570f625bb8ac8043f76e6cc4a71e801dc0ccf171b5720dacdccafc1e7f2b6acd3d

  • memory/1048-132-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2276-133-0x0000000000000000-mapping.dmp
  • memory/2276-136-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB