Analysis

  • max time kernel
    166s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:23

General

  • Target

    d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711.exe

  • Size

    1.7MB

  • MD5

    e79be00e6684247db2bd6ab49cba1e3f

  • SHA1

    96c4f2eeee0cfecc8658d3e17dd607081eb2b101

  • SHA256

    d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711

  • SHA512

    acdb105f281b515dcae0b69d35c60737761a59025097167d9800f9cdd2819625a725ef5589a3527c6985e44298d88c4d3675bc0deb0e6c105856dddc8cccac35

  • SSDEEP

    49152:KyNvFE3c+0dR3rI+MnFZFVkpRR5fhFzu+9Uq+C:KyNvFE3c+0dR3rkH3M5fhRu+Gq+C

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711.exe
    "C:\Users\Admin\AppData\Local\Temp\d41fc40212e1f3439b0a8237ff7fdc4ef18692834c892da1d059b9eb2210b711.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -u GMLMCPMT.DaX -S
      2⤵
      • Loads dropped DLL
      PID:1448

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GMLMCPMT.DaX

    Filesize

    1.7MB

    MD5

    2dbbbb50d7ad4990d123ada62331c270

    SHA1

    cb169bb33db859f7366fd5b9f166b536c296f242

    SHA256

    7d75fef8179c81eca4e2d0e9773443d33487b6300d7d14316dfdc37c8fc6c8c3

    SHA512

    ca243c212d27b4f43c540646ace91f1009ed3f472a0b56d2e904f2c96677a24941862f179195bad9da753fb3114e0205670f2915ba0e0631252333a23a661c41

  • C:\Users\Admin\AppData\Local\Temp\GmlMCpMT.daX

    Filesize

    1.7MB

    MD5

    2dbbbb50d7ad4990d123ada62331c270

    SHA1

    cb169bb33db859f7366fd5b9f166b536c296f242

    SHA256

    7d75fef8179c81eca4e2d0e9773443d33487b6300d7d14316dfdc37c8fc6c8c3

    SHA512

    ca243c212d27b4f43c540646ace91f1009ed3f472a0b56d2e904f2c96677a24941862f179195bad9da753fb3114e0205670f2915ba0e0631252333a23a661c41

  • memory/1448-132-0x0000000000000000-mapping.dmp

  • memory/1448-135-0x0000000002F70000-0x000000000303E000-memory.dmp

    Filesize

    824KB

  • memory/1448-136-0x0000000002C30000-0x0000000002D40000-memory.dmp

    Filesize

    1.1MB

  • memory/1448-137-0x0000000002E50000-0x0000000002F61000-memory.dmp

    Filesize

    1.1MB

  • memory/1448-138-0x0000000003040000-0x00000000030FC000-memory.dmp

    Filesize

    752KB