Analysis

  • max time kernel
    130s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:34

General

  • Target

    7cfdb8a1d766649af4386d8e4af0a1fa60b4b9e3991498116c6a5eacff2b795d.exe

  • Size

    163KB

  • MD5

    3871f1f017026b6c6a439902213712cf

  • SHA1

    a664f294c49d184122877046e26c1487fc595dff

  • SHA256

    7cfdb8a1d766649af4386d8e4af0a1fa60b4b9e3991498116c6a5eacff2b795d

  • SHA512

    52db4fd141c5369b92757f2e9b2bef38e5b29e1ddd922cd2651deae215c7dc6608eec73ad56f75d1703e91165866ee5f3a73b3f8c11db3652322fc3854043f0f

  • SSDEEP

    3072:Bz+92mhTMMJ/cPiq5bVin8/e6UN1U/FdcuAC/Qjk+cT:Bz+92mhAMJ/cPl3i8/tUN1nuAC/aS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cfdb8a1d766649af4386d8e4af0a1fa60b4b9e3991498116c6a5eacff2b795d.exe
    "C:\Users\Admin\AppData\Local\Temp\7cfdb8a1d766649af4386d8e4af0a1fa60b4b9e3991498116c6a5eacff2b795d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\lol.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ddos.exe
        ddos.exe -dC:\Users\Admin\AppData\Local\Temp
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        PID:2088

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ddos.exe
    Filesize

    143KB

    MD5

    f635a4b74fdc56e848870f277b71f970

    SHA1

    6f7768ba7eb98f2513a2437804e00f10f384af7c

    SHA256

    50af3581fd24b49bc07a680501d33c6a257e295642b8d4c3c3c680ba6e6f1e2a

    SHA512

    751ca86fe6d3bac2a1142b21160fd33a2d5bae8104c9a71d78016d52b36232fee2e184a79e1ae1efcbc48a1f16d6bfb59108ad8f2fdeb0ef52c0a77d51556267

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ddos.exe
    Filesize

    143KB

    MD5

    f635a4b74fdc56e848870f277b71f970

    SHA1

    6f7768ba7eb98f2513a2437804e00f10f384af7c

    SHA256

    50af3581fd24b49bc07a680501d33c6a257e295642b8d4c3c3c680ba6e6f1e2a

    SHA512

    751ca86fe6d3bac2a1142b21160fd33a2d5bae8104c9a71d78016d52b36232fee2e184a79e1ae1efcbc48a1f16d6bfb59108ad8f2fdeb0ef52c0a77d51556267

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\lol.bat
    Filesize

    17B

    MD5

    c719c903e82dd99ac04773bc9c293040

    SHA1

    cad78b512d40c959a03a78c61f7320e1b4547d6c

    SHA256

    a0a192d3a7aa9b5dede8f070b1b59a28eabb8182a513b81716b194bb3e5931e9

    SHA512

    8a2202526cd6a44f74d74bd88fcf94f471a2cb7f72fc127a573fb3cf1b55c9901496dc91a82126816308a24e5f6d6fd5188493060b3e5796d4ed072bd453f098

  • memory/1324-132-0x0000000000000000-mapping.dmp
  • memory/2088-134-0x0000000000000000-mapping.dmp