Analysis

  • max time kernel
    98s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:35

General

  • Target

    eae62175cebb33521e1f2c250a0715dcdc93f9787eb96c871dc2d0ba48b3e3ba.exe

  • Size

    318KB

  • MD5

    e4793a916988680cb6c486a4d22a0ca2

  • SHA1

    6269b79ad380e6af276bb14e41a2f0e3c73ef5ff

  • SHA256

    eae62175cebb33521e1f2c250a0715dcdc93f9787eb96c871dc2d0ba48b3e3ba

  • SHA512

    e517bdbba891e3e4b929255b4a2a24a62b67c6a3c94d913d496d3c735dc25c59f1240148f7179db3c5e64344344c9385eddb7508233c334605cd3069e65b8947

  • SSDEEP

    6144:xHvQjzb2lszlh979Hd+aIIFCd5J5xQUXPD39P5uSSPzFF95sU:hQjziGlD7xd+zXDSY7pSPB

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eae62175cebb33521e1f2c250a0715dcdc93f9787eb96c871dc2d0ba48b3e3ba.exe
    "C:\Users\Admin\AppData\Local\Temp\eae62175cebb33521e1f2c250a0715dcdc93f9787eb96c871dc2d0ba48b3e3ba.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\eae62175cebb33521e1f2c250a0715dcdc93f9787eb96c871dc2d0ba48b3e3ba.exe
      "C:\Users\Admin\AppData\Local\Temp\eae62175cebb33521e1f2c250a0715dcdc93f9787eb96c871dc2d0ba48b3e3ba.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2920
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe
        3⤵
        • Executes dropped EXE
        PID:2784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe

    Filesize

    318KB

    MD5

    e4793a916988680cb6c486a4d22a0ca2

    SHA1

    6269b79ad380e6af276bb14e41a2f0e3c73ef5ff

    SHA256

    eae62175cebb33521e1f2c250a0715dcdc93f9787eb96c871dc2d0ba48b3e3ba

    SHA512

    e517bdbba891e3e4b929255b4a2a24a62b67c6a3c94d913d496d3c735dc25c59f1240148f7179db3c5e64344344c9385eddb7508233c334605cd3069e65b8947

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe

    Filesize

    318KB

    MD5

    e4793a916988680cb6c486a4d22a0ca2

    SHA1

    6269b79ad380e6af276bb14e41a2f0e3c73ef5ff

    SHA256

    eae62175cebb33521e1f2c250a0715dcdc93f9787eb96c871dc2d0ba48b3e3ba

    SHA512

    e517bdbba891e3e4b929255b4a2a24a62b67c6a3c94d913d496d3c735dc25c59f1240148f7179db3c5e64344344c9385eddb7508233c334605cd3069e65b8947

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe

    Filesize

    17KB

    MD5

    09b171f5148c39fbc02e59ec67f57a5c

    SHA1

    00d7926037412a5fc22819bb1cfa8d698e9223fe

    SHA256

    6117d1517e1953ffa068642e78e868ab819ffd0bfc448cfa37a01971d32caad1

    SHA512

    5267cc5effc1cc9401cb3f36c2044e524e0f8b58e5d2ca7d4150824e8c53ebe832a98288368694e4e86ff384bcad89bafa197a8dd19164d17d229ca8b9bb219d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IpOverUsbSvrc.exe

    Filesize

    17KB

    MD5

    09b171f5148c39fbc02e59ec67f57a5c

    SHA1

    00d7926037412a5fc22819bb1cfa8d698e9223fe

    SHA256

    6117d1517e1953ffa068642e78e868ab819ffd0bfc448cfa37a01971d32caad1

    SHA512

    5267cc5effc1cc9401cb3f36c2044e524e0f8b58e5d2ca7d4150824e8c53ebe832a98288368694e4e86ff384bcad89bafa197a8dd19164d17d229ca8b9bb219d

  • memory/2080-136-0x0000000074E50000-0x0000000075401000-memory.dmp

    Filesize

    5.7MB

  • memory/2080-135-0x0000000074E50000-0x0000000075401000-memory.dmp

    Filesize

    5.7MB

  • memory/2784-146-0x0000000000000000-mapping.dmp

  • memory/2784-150-0x0000000074E50000-0x0000000075401000-memory.dmp

    Filesize

    5.7MB

  • memory/2784-149-0x0000000074E50000-0x0000000075401000-memory.dmp

    Filesize

    5.7MB

  • memory/2920-142-0x0000000074E50000-0x0000000075401000-memory.dmp

    Filesize

    5.7MB

  • memory/2920-144-0x0000000074E50000-0x0000000075401000-memory.dmp

    Filesize

    5.7MB

  • memory/2920-137-0x0000000000000000-mapping.dmp

  • memory/5040-145-0x0000000074E50000-0x0000000075401000-memory.dmp

    Filesize

    5.7MB

  • memory/5040-143-0x0000000074E50000-0x0000000075401000-memory.dmp

    Filesize

    5.7MB

  • memory/5040-139-0x0000000000000000-mapping.dmp