Analysis

  • max time kernel
    200s
  • max time network
    214s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 20:13

General

  • Target

    d62e3c24de3e6fb4bc2d033be03a52bb4c69ee5141f046defa0003c4afac7cd4.exe

  • Size

    54KB

  • MD5

    57e34387cdcaf4921dc9b9e7f8706800

  • SHA1

    f229b450fc64ad1bb0360121a94b353eddd42f16

  • SHA256

    d62e3c24de3e6fb4bc2d033be03a52bb4c69ee5141f046defa0003c4afac7cd4

  • SHA512

    a5c4caf7ca37568cd3825657e76849001b1f9cbc32672267a30afd52550526387a439ca583c5997f1b8a46038478705301b3e8c00d30a21b953ed1ad3ed6fd54

  • SSDEEP

    1536:AErdoU9DEfPF3CZBwaX35U+KOgfSuPhKUrtEYBFBtnyNc:AErnTB7Xp2fSKBxEK5a

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d62e3c24de3e6fb4bc2d033be03a52bb4c69ee5141f046defa0003c4afac7cd4.exe
    "C:\Users\Admin\AppData\Local\Temp\d62e3c24de3e6fb4bc2d033be03a52bb4c69ee5141f046defa0003c4afac7cd4.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Windows\SysWOW64\SceUpdata.exe
      "C:\Windows\system32\SceUpdata.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:2236
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\test.bat
      2⤵
        PID:3928

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\GoogleApp.dll
      Filesize

      58KB

      MD5

      d154681e1a8c7defe85355cf24462865

      SHA1

      064ccce0a08229c79e32b7c7a34afdceee9543e9

      SHA256

      0e71c8d551175a2212819b3f6b141b308d6cf997746f4af4e73b92ec63b337e3

      SHA512

      8b47439cfec2f2797d9cc1bdaa6cb5f4e4cc100a00ac6a858ba2e812a9e2455e392d022993cb2eddb0c87003f95432789248667886a7d7543795a3939e6c97dc

    • C:\Windows\SysWOW64\GoogleApp.dll
      Filesize

      58KB

      MD5

      d154681e1a8c7defe85355cf24462865

      SHA1

      064ccce0a08229c79e32b7c7a34afdceee9543e9

      SHA256

      0e71c8d551175a2212819b3f6b141b308d6cf997746f4af4e73b92ec63b337e3

      SHA512

      8b47439cfec2f2797d9cc1bdaa6cb5f4e4cc100a00ac6a858ba2e812a9e2455e392d022993cb2eddb0c87003f95432789248667886a7d7543795a3939e6c97dc

    • C:\Windows\SysWOW64\GoogleApp.dll
      Filesize

      58KB

      MD5

      d154681e1a8c7defe85355cf24462865

      SHA1

      064ccce0a08229c79e32b7c7a34afdceee9543e9

      SHA256

      0e71c8d551175a2212819b3f6b141b308d6cf997746f4af4e73b92ec63b337e3

      SHA512

      8b47439cfec2f2797d9cc1bdaa6cb5f4e4cc100a00ac6a858ba2e812a9e2455e392d022993cb2eddb0c87003f95432789248667886a7d7543795a3939e6c97dc

    • C:\Windows\SysWOW64\GoogleApp.dll
      Filesize

      58KB

      MD5

      d154681e1a8c7defe85355cf24462865

      SHA1

      064ccce0a08229c79e32b7c7a34afdceee9543e9

      SHA256

      0e71c8d551175a2212819b3f6b141b308d6cf997746f4af4e73b92ec63b337e3

      SHA512

      8b47439cfec2f2797d9cc1bdaa6cb5f4e4cc100a00ac6a858ba2e812a9e2455e392d022993cb2eddb0c87003f95432789248667886a7d7543795a3939e6c97dc

    • C:\Windows\SysWOW64\SceUpdata.exe
      Filesize

      54KB

      MD5

      57e34387cdcaf4921dc9b9e7f8706800

      SHA1

      f229b450fc64ad1bb0360121a94b353eddd42f16

      SHA256

      d62e3c24de3e6fb4bc2d033be03a52bb4c69ee5141f046defa0003c4afac7cd4

      SHA512

      a5c4caf7ca37568cd3825657e76849001b1f9cbc32672267a30afd52550526387a439ca583c5997f1b8a46038478705301b3e8c00d30a21b953ed1ad3ed6fd54

    • C:\Windows\SysWOW64\SceUpdata.exe
      Filesize

      54KB

      MD5

      57e34387cdcaf4921dc9b9e7f8706800

      SHA1

      f229b450fc64ad1bb0360121a94b353eddd42f16

      SHA256

      d62e3c24de3e6fb4bc2d033be03a52bb4c69ee5141f046defa0003c4afac7cd4

      SHA512

      a5c4caf7ca37568cd3825657e76849001b1f9cbc32672267a30afd52550526387a439ca583c5997f1b8a46038478705301b3e8c00d30a21b953ed1ad3ed6fd54

    • C:\Windows\SysWOW64\zmdll.lst
      Filesize

      200B

      MD5

      d796710eebbe3f0584f0099d4e7ddb65

      SHA1

      420b2032f1dddf12a12e392e2284390403e13c34

      SHA256

      658cce9eefaa457e5f60428da451cdbf8e96920c459f2a1c5586c0f70eea5d6f

      SHA512

      af14c79648d9c2c098fb295e2c9d8ddcd7849f44134fa4e44fe9f59f93a31d87736250e2390e200bd959e4d187a58c41011b980ca661ab19ee9d9b1bd555c045

    • \??\c:\test.bat
      Filesize

      249B

      MD5

      7dc0a405c8721cf02e6bc87e5804d812

      SHA1

      56e6cea3532d6b3afdf60713ac1aeb20750a6eaf

      SHA256

      ca248b677cc89b276ba89993dba97050a232994caa981acae6507f9475c67b19

      SHA512

      5b856f8c6422c8af2c62c2c9cc0adbcdf55760371109bf07a625c3da88d3bcd395c6108263cc8bcf319e058ab5db56048d7422e1098a9f11cbfa472f33038ba3

    • memory/2236-134-0x0000000000000000-mapping.dmp
    • memory/3928-140-0x0000000000000000-mapping.dmp
    • memory/4788-132-0x0000000000400000-0x0000000000417000-memory.dmp
      Filesize

      92KB

    • memory/4788-141-0x0000000000400000-0x0000000000417000-memory.dmp
      Filesize

      92KB