Analysis

  • max time kernel
    189s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:32

General

  • Target

    aa630faba0de71e02b97adea495861ef2eaf8fc6d2e51a3ebb382e1bd65a9b34.exe

  • Size

    4.3MB

  • MD5

    ad52d435482a7f1f8f37c96e9277faf3

  • SHA1

    1d3e3a05f250eca922f6c0d278144a8444e18758

  • SHA256

    aa630faba0de71e02b97adea495861ef2eaf8fc6d2e51a3ebb382e1bd65a9b34

  • SHA512

    b586328e2d77dbaca1b7af2fd00bab5046f2a08f154b9e2633f9abd66665027ec8b850ed4b1980ca9fea33dd83b160c47f2045bb8f9fab00b9f7c933496303e3

  • SSDEEP

    98304:N9mC/uNVLc9KZQk7I3sMU3lWXYkzGDeyW4:NkC/SRcEGq3wokzD4

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa630faba0de71e02b97adea495861ef2eaf8fc6d2e51a3ebb382e1bd65a9b34.exe
    "C:\Users\Admin\AppData\Local\Temp\aa630faba0de71e02b97adea495861ef2eaf8fc6d2e51a3ebb382e1bd65a9b34.exe"
    1⤵
    • Checks computer location settings
    PID:1212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1212-132-0x0000000074D20000-0x00000000752D1000-memory.dmp

    Filesize

    5.7MB

  • memory/1212-133-0x0000000074D20000-0x00000000752D1000-memory.dmp

    Filesize

    5.7MB