Analysis

  • max time kernel
    188s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:40

General

  • Target

    81e695f628436a4850bec46b3f90906433a0d11ae163f298f48fae788362d29a.exe

  • Size

    18KB

  • MD5

    840b3b6a714f7330706f0c19f99d5eb8

  • SHA1

    6bd97b730e176560752902a2cfe968db6c7860e3

  • SHA256

    81e695f628436a4850bec46b3f90906433a0d11ae163f298f48fae788362d29a

  • SHA512

    ad2816a99f227ca6e5e3f9e2c117f2a5311d98e635619d4d163d3db9369ebd511167715685588b6cde85a5176216e317d947f3ddf94450195ba7cbace53cfd17

  • SSDEEP

    192:K790pylszn3MPFjuOZrCZ047a1oyn361miLMgepar8Vd/:s2pzn4sOZrCv7a18wiLMge68Vd

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81e695f628436a4850bec46b3f90906433a0d11ae163f298f48fae788362d29a.exe
    "C:\Users\Admin\AppData\Local\Temp\81e695f628436a4850bec46b3f90906433a0d11ae163f298f48fae788362d29a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Users\Admin\AppData\Local\Temp\vytkz.exe
      "C:\Users\Admin\AppData\Local\Temp\vytkz.exe"
      2⤵
      • Executes dropped EXE
      PID:4132

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\vytkz.exe

    Filesize

    18KB

    MD5

    0d644f2942a7701ea9284c335b7c08b0

    SHA1

    efc5ebda9a2a7a67140ffe37ba8186a6fb142aab

    SHA256

    fd59c915723d44c7fb5f2bf79085adc17290c8257ae9f8e0f25180914e683022

    SHA512

    991110f0b88427a02e3f419a2f6d32d7fd5d928864648be9e6f0b5becee9a1ec0db12af3aa083681648e12ebb90aa3b3bcbceda3959fcfa7b33750dbefa04343

  • C:\Users\Admin\AppData\Local\Temp\vytkz.exe

    Filesize

    18KB

    MD5

    0d644f2942a7701ea9284c335b7c08b0

    SHA1

    efc5ebda9a2a7a67140ffe37ba8186a6fb142aab

    SHA256

    fd59c915723d44c7fb5f2bf79085adc17290c8257ae9f8e0f25180914e683022

    SHA512

    991110f0b88427a02e3f419a2f6d32d7fd5d928864648be9e6f0b5becee9a1ec0db12af3aa083681648e12ebb90aa3b3bcbceda3959fcfa7b33750dbefa04343

  • memory/3412-132-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4132-133-0x0000000000000000-mapping.dmp

  • memory/4132-136-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB