Analysis

  • max time kernel
    154s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 21:19

General

  • Target

    c3c6a53b5cac572d21302034aa2501b4bd0612e634a243424bbd06c032a8baa7.exe

  • Size

    284KB

  • MD5

    1511076a857d8cf5b17645dda2468b72

  • SHA1

    bb36b5cbe1d41c4ff831faa752b3680616566793

  • SHA256

    c3c6a53b5cac572d21302034aa2501b4bd0612e634a243424bbd06c032a8baa7

  • SHA512

    9ce7d8319ab76d6e04416af1d4c099b7180ea9e31d74755e97daaf1d5df01f0dbc49e5a01f1a861693464945e96121973a2d5b07f2750411b84561c168c3abf7

  • SSDEEP

    6144:F8U2qy6rRZb7jx20HJoz26rln1UnILR7GjDHqoVSw3my8A7R4f4k+AUgJiw:lzy6rRxUvrXYIN7KDqo7W/94veiw

Score
9/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 7 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3c6a53b5cac572d21302034aa2501b4bd0612e634a243424bbd06c032a8baa7.exe
    "C:\Users\Admin\AppData\Local\Temp\c3c6a53b5cac572d21302034aa2501b4bd0612e634a243424bbd06c032a8baa7.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3312
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.bat" "
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 C:\Windows\system32\ecologyplugin\fileupload\WeaverOcx.ocx /s
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:736
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Windows\system32\ecologyplugin\fileupload\readme.txt
        3⤵
        • Loads dropped DLL
        • Opens file in notepad (likely ransom note)
        PID:3504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\LOGO.ico

    Filesize

    2KB

    MD5

    41eca7a9245394106a09b2534d8030df

    SHA1

    b38e19173aea521d2fb00ef706abb0df7d076b0c

    SHA256

    f1a9670d5b4ee0fed36b7370193e4aa052f916ee038d91b6fd041cbc4dbb3683

    SHA512

    cd2fdc7b063e986278e463af34d040d5bd6851bfa1893841df6fadf428e740cf3555950186e98e533038d3588b97a66933c3f1564d9afec14750bd442c2dfdfe

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\WeaverOcx.ocx

    Filesize

    40KB

    MD5

    7122346c3db160e17242c8de6db2b960

    SHA1

    4cb6e3d8515b7ee76bc82ec500ba9ba07e51bfe8

    SHA256

    21917f0440b0d851f7da838866c059ea57efa779a11c8fea15f5b736e5e7dafd

    SHA512

    25763ff6e2da1bef4bc21487e3f16d6002c84b869090c9d48ef3dc186056a48e0b12ad56d41fea6d69840bce708d90ef81d9b3285da4e335281186cda397d144

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rar.bmp

    Filesize

    2KB

    MD5

    a9fabad349a7121db3c799ede8f74d6e

    SHA1

    d13448fc14fa6a1e0ab7c995f319faa84750dff4

    SHA256

    6647c05a05cf81458ab13bbfaf98a78ea30171d8497d0b79b6dbcece8af6d993

    SHA512

    269b95c2ed60f65998e7a2aa0b18e3ffb08dbdb05f2bdce2070a5731bdf23b911f9a812c06879c999fee25d0dd72cac04b5026165b34fe3093414fffac641e2b

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\readme.txt

    Filesize

    246B

    MD5

    342597013016005172d39717884561d9

    SHA1

    9d6197a2fb94a5b83a61ae4f8922305c12b8b34b

    SHA256

    f242a26addc3c6789d963743f7efd2f643bbc184991da0fb15538b19a5218f4f

    SHA512

    f5a2d1844a2075f0a425d2216f1b34528fab92a6b9d18238d267c08e38d3717308987d2e1d4d3bae7a723c868659f23d933ec5878e7a775242df0224fc711ade

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.bat

    Filesize

    485B

    MD5

    a68526a434b4e1ae4351f9ca7bc7d731

    SHA1

    65dd5f230997f1c975d9124fbb09d938c904bf65

    SHA256

    b2aab4a718f49e137049ca87e7c79492ab25fde9181ee170be4b966a864a38c1

    SHA512

    96d43ff67a4ec994946a2fb80b76e30c4e08781f56b50cd2d335fd4070f47b94d8fc7062a246d3f3823208fc7263ad2b96d6731810cfc22c94807c46981de3ee

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\uninstall.bat

    Filesize

    236B

    MD5

    a3d12b8923be10b74421863906c1c930

    SHA1

    7dda04de45af58da19c2b992a7169c0e1f2b7ea4

    SHA256

    90becb5f1db9f7269d978fb312c825507972f006953cb76f2cf344dfb6ec6c53

    SHA512

    b8e65be4f95c375becaa05da073d04b4ea5d572278adae314528f2bbd909a9f7463a13c675ddd8418f2aba5eb6a4f03e8e5f008c023a39004951a4089e5ecc8d

  • C:\Users\Admin\AppData\Local\Temp\tviD8C1.tmp

    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • C:\Users\Admin\AppData\Local\Temp\tviD8C1.tmp

    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • C:\Users\Admin\AppData\Local\Temp\tviD8C1.tmp

    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • C:\Users\Admin\AppData\Local\Temp\tviD8C1.tmp

    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • C:\Users\Admin\AppData\Local\Temp\tviD8C1.tmp

    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • C:\Users\Admin\AppData\Local\Temp\tviD8C1.tmp

    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • C:\Users\Admin\AppData\Local\Temp\tviD8C1.tmp

    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • C:\Windows\SysWOW64\ecologyplugin\fileupload\WeaverOcx.ocx

    Filesize

    40KB

    MD5

    7122346c3db160e17242c8de6db2b960

    SHA1

    4cb6e3d8515b7ee76bc82ec500ba9ba07e51bfe8

    SHA256

    21917f0440b0d851f7da838866c059ea57efa779a11c8fea15f5b736e5e7dafd

    SHA512

    25763ff6e2da1bef4bc21487e3f16d6002c84b869090c9d48ef3dc186056a48e0b12ad56d41fea6d69840bce708d90ef81d9b3285da4e335281186cda397d144

  • C:\Windows\SysWOW64\ecologyplugin\fileupload\WeaverOcx.ocx

    Filesize

    40KB

    MD5

    7122346c3db160e17242c8de6db2b960

    SHA1

    4cb6e3d8515b7ee76bc82ec500ba9ba07e51bfe8

    SHA256

    21917f0440b0d851f7da838866c059ea57efa779a11c8fea15f5b736e5e7dafd

    SHA512

    25763ff6e2da1bef4bc21487e3f16d6002c84b869090c9d48ef3dc186056a48e0b12ad56d41fea6d69840bce708d90ef81d9b3285da4e335281186cda397d144

  • C:\Windows\SysWOW64\ecologyplugin\fileupload\readme.txt

    Filesize

    246B

    MD5

    342597013016005172d39717884561d9

    SHA1

    9d6197a2fb94a5b83a61ae4f8922305c12b8b34b

    SHA256

    f242a26addc3c6789d963743f7efd2f643bbc184991da0fb15538b19a5218f4f

    SHA512

    f5a2d1844a2075f0a425d2216f1b34528fab92a6b9d18238d267c08e38d3717308987d2e1d4d3bae7a723c868659f23d933ec5878e7a775242df0224fc711ade

  • memory/736-144-0x0000000000000000-mapping.dmp

  • memory/736-150-0x00000000008F0000-0x0000000000963000-memory.dmp

    Filesize

    460KB

  • memory/3276-137-0x0000000000000000-mapping.dmp

  • memory/3276-155-0x0000000000400000-0x0000000000473000-memory.dmp

    Filesize

    460KB

  • memory/3312-133-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/3312-136-0x0000000000A00000-0x0000000000A73000-memory.dmp

    Filesize

    460KB

  • memory/3312-157-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/3312-158-0x0000000000A00000-0x0000000000A73000-memory.dmp

    Filesize

    460KB

  • memory/3504-152-0x0000000000000000-mapping.dmp

  • memory/3504-156-0x0000000000400000-0x0000000000473000-memory.dmp

    Filesize

    460KB