Analysis

  • max time kernel
    254s
  • max time network
    345s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 16:00

General

  • Target

    84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe

  • Size

    758KB

  • MD5

    81a370473c4ff6da18b2f4c4fe7d9bfe

  • SHA1

    560cdcb52853d2373e39419d20c314166cb858d4

  • SHA256

    84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c

  • SHA512

    4c62fc999a3bbbb06492b88da8b3b6190041e5e78c9fe7929900b8af587a3b977816a8617d679696011f83721149c3acd6614091f05a243ee6881a39f8b7859c

  • SSDEEP

    6144:gxc4a/N7TB+rrUri2YiQdNBq31LAJ2R4zFuHaoTFuHao3FuHao:gxlaF7TcrrUri7tNRJ2R4ztstAt

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe
    "C:\Users\Admin\AppData\Local\Temp\84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      "C:\Users\Admin\AppData\Local\Temp\1.exe"
      2⤵
      • Executes dropped EXE
      PID:3804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1.exe

    Filesize

    620KB

    MD5

    69337cff41a1860439f294a9e340cc7e

    SHA1

    b7fc608f41868943edfe1df01e922287bb311c2c

    SHA256

    25edd3c1a5b10376d679f0072e8ee3805289bad89e38273d721408e43f5a14e5

    SHA512

    db6d6de190299a34beb9a86afa29081352fe8e914998a62a8fac1939d23694972762a2d003a757ef2dba9e039a9c9f516696c93197539316ddc3df3cc43180f0

  • C:\Users\Admin\AppData\Local\Temp\1.exe

    Filesize

    620KB

    MD5

    69337cff41a1860439f294a9e340cc7e

    SHA1

    b7fc608f41868943edfe1df01e922287bb311c2c

    SHA256

    25edd3c1a5b10376d679f0072e8ee3805289bad89e38273d721408e43f5a14e5

    SHA512

    db6d6de190299a34beb9a86afa29081352fe8e914998a62a8fac1939d23694972762a2d003a757ef2dba9e039a9c9f516696c93197539316ddc3df3cc43180f0

  • memory/3804-132-0x0000000000000000-mapping.dmp

  • memory/3804-135-0x0000000073B40000-0x00000000740F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3804-136-0x0000000073B40000-0x00000000740F1000-memory.dmp

    Filesize

    5.7MB