Analysis
-
max time kernel
186s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 20:54
Static task
static1
Behavioral task
behavioral1
Sample
6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe
Resource
win10v2004-20220812-en
General
-
Target
6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe
-
Size
10KB
-
MD5
364d2e72f27e8b3e202ed4658dab9228
-
SHA1
13870035968c15cf8c69ecebdc35b4870e6661fb
-
SHA256
6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f
-
SHA512
7094029f737a4b488318a45b7c6817d232f942e0c92001f78a761ededb64ea87d5c063d9ef1789c006c83b36875a3ba6c59cd1e22af939d6771d9e01578629dc
-
SSDEEP
192:4oUJ8AaGmQXNHevO8SebnETar+KMV86I1csZp1+Xi:4oUJ5Cw58SeETIu+ZpT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
DRCTROY.exepid process 3268 DRCTROY.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exeDRCTROY.exedescription pid process target process PID 2408 wrote to memory of 3268 2408 6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe DRCTROY.exe PID 2408 wrote to memory of 3268 2408 6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe DRCTROY.exe PID 2408 wrote to memory of 3268 2408 6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe DRCTROY.exe PID 3268 wrote to memory of 876 3268 DRCTROY.exe netsh.exe PID 3268 wrote to memory of 876 3268 DRCTROY.exe netsh.exe PID 3268 wrote to memory of 876 3268 DRCTROY.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe"C:\Users\Admin\AppData\Local\Temp\6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\DRCTROY.exe"C:\Users\Admin\AppData\Local\Temp\DRCTROY.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\DRCTROY.exe" "DRCTROY.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:876
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5364d2e72f27e8b3e202ed4658dab9228
SHA113870035968c15cf8c69ecebdc35b4870e6661fb
SHA2566deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f
SHA5127094029f737a4b488318a45b7c6817d232f942e0c92001f78a761ededb64ea87d5c063d9ef1789c006c83b36875a3ba6c59cd1e22af939d6771d9e01578629dc
-
Filesize
10KB
MD5364d2e72f27e8b3e202ed4658dab9228
SHA113870035968c15cf8c69ecebdc35b4870e6661fb
SHA2566deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f
SHA5127094029f737a4b488318a45b7c6817d232f942e0c92001f78a761ededb64ea87d5c063d9ef1789c006c83b36875a3ba6c59cd1e22af939d6771d9e01578629dc