Analysis

  • max time kernel
    156s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:38

General

  • Target

    9326ad9b683b2ac6b016734ba7beab596855f5a00f22a53b640f9df53ff418ec.exe

  • Size

    50KB

  • MD5

    04b990e1524b8f4a31a15ef216eb7d77

  • SHA1

    44f21cc33d1c30d22401216e94a2f5a1c1d6ef51

  • SHA256

    9326ad9b683b2ac6b016734ba7beab596855f5a00f22a53b640f9df53ff418ec

  • SHA512

    3e0799ea0888dcff080dd6abcf104485bc43c884766a126b18276a1e8f81ebeb883a209c5627ca632ef75a93c3d834ed157881cc9cfa5d1639d9faa35d6a7bf0

  • SSDEEP

    768:ccdnViuE992FvItGa9uirG9F1dVwuG1MLlTVhhvNX80vZBAL0MXj+ehS:cIYbRMVwuTLlTxv/ILR3S

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9326ad9b683b2ac6b016734ba7beab596855f5a00f22a53b640f9df53ff418ec.exe
    "C:\Users\Admin\AppData\Local\Temp\9326ad9b683b2ac6b016734ba7beab596855f5a00f22a53b640f9df53ff418ec.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9326ad9b683b2ac6b016734ba7beab596855f5a00f22a53b640f9df53ff418ec.rtf" /o ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9326ad9b683b2ac6b016734ba7beab596855f5a00f22a53b640f9df53ff418ec.rtf

    Filesize

    5KB

    MD5

    cac843d43cd41257be1b4a6c34225be8

    SHA1

    50f599dcd2f9a9df75c83af4135301d4a707e678

    SHA256

    7026bdbd752ae063344ce078085dc2e15b4520cab5eec4a22f7d9bf2f10929d3

    SHA512

    22994168e9724f447338343ae3d99b774a24d86a29cff13331ec485678e29b824223bcf34454d5c1a250a990f56014c3bc133093d7fc35a947fca693e1d0520b

  • memory/2336-138-0x00007FFD3E6B0000-0x00007FFD3E6C0000-memory.dmp

    Filesize

    64KB

  • memory/2336-134-0x00007FFD40710000-0x00007FFD40720000-memory.dmp

    Filesize

    64KB

  • memory/2336-135-0x00007FFD40710000-0x00007FFD40720000-memory.dmp

    Filesize

    64KB

  • memory/2336-136-0x00007FFD40710000-0x00007FFD40720000-memory.dmp

    Filesize

    64KB

  • memory/2336-137-0x00007FFD40710000-0x00007FFD40720000-memory.dmp

    Filesize

    64KB

  • memory/2336-132-0x0000000000000000-mapping.dmp

  • memory/2336-139-0x00007FFD3E6B0000-0x00007FFD3E6C0000-memory.dmp

    Filesize

    64KB

  • memory/2336-133-0x00007FFD40710000-0x00007FFD40720000-memory.dmp

    Filesize

    64KB

  • memory/2336-142-0x00007FFD40710000-0x00007FFD40720000-memory.dmp

    Filesize

    64KB

  • memory/2336-143-0x00007FFD40710000-0x00007FFD40720000-memory.dmp

    Filesize

    64KB

  • memory/2336-144-0x00007FFD40710000-0x00007FFD40720000-memory.dmp

    Filesize

    64KB

  • memory/2336-145-0x00007FFD40710000-0x00007FFD40720000-memory.dmp

    Filesize

    64KB