Analysis

  • max time kernel
    91s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 14:09

General

  • Target

    b0d998157a5602c0f97d328b38e82177ceeb380862ac46258c5cb5727bfa7cf7.exe

  • Size

    1.7MB

  • MD5

    2010f94a111ab8d9e0a25d7aefd2704e

  • SHA1

    cc5fb0d3c2ac669a04ce073e2023200107a1846a

  • SHA256

    b0d998157a5602c0f97d328b38e82177ceeb380862ac46258c5cb5727bfa7cf7

  • SHA512

    daec0ed4e7ed5467c9b59db2976227f142a56f1e3eadd138baf6281d63ea565849da08c1ffcad056fc49909a42d16b79bbcf546ef37977f3e386566ca3dbcc71

  • SSDEEP

    24576:GhGyCHW7fOpOQWzYSQ6iRUxgrGEMr3LvDUUk1+CtdEckOOZ2K7bGqvUCSVt:GhGVHWyOrVuUUMrbZk1yckOOZ2fyUtr

Score
8/10

Malware Config

Signatures

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops desktop.ini file(s) 29 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0d998157a5602c0f97d328b38e82177ceeb380862ac46258c5cb5727bfa7cf7.exe
    "C:\Users\Admin\AppData\Local\Temp\b0d998157a5602c0f97d328b38e82177ceeb380862ac46258c5cb5727bfa7cf7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Windows\SysWOW64\write.exe
      C:\Users\Admin\AppData\Local\Temp\b0d998157a5602c0f97d328b38e82177ceeb380862ac46258c5cb5727bfa7cf7.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3100
      • C:\Windows\SysWOW64\write.exe
        "C:\Windows\system32\write.exe"
        3⤵
        • Modifies extensions of user files
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Suspicious behavior: EnumeratesProcesses
        PID:8660

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2891029575-1462575-1165213807-1000\desktop.ini
    Filesize

    876B

    MD5

    ccf0567081f812a4dc46a0c66271bc61

    SHA1

    a564f839023b5aff353107a9eeaf7b74e693d8f7

    SHA256

    f7497d8a7e36b45c8cce8235388c93e62fe4de4bc3b263014a4ceada6a63fd1c

    SHA512

    323c651cb5b87afbaea9058da057aeaac8bfd577e0b685a7e99f0296f78aeb6e595a5bef0ff86c98851abd9b70ad3629a6e7a9f45672b88564ae21421c64390e

  • memory/3100-135-0x0000000000A25B00-mapping.dmp
  • memory/3100-134-0x0000000000A10000-0x0000000000B2C000-memory.dmp
    Filesize

    1.1MB

  • memory/3100-136-0x0000000000A10000-0x0000000000B2C000-memory.dmp
    Filesize

    1.1MB

  • memory/3100-140-0x0000000000A10000-0x0000000000B2C000-memory.dmp
    Filesize

    1.1MB

  • memory/5104-132-0x0000000002B20000-0x0000000002E59000-memory.dmp
    Filesize

    3.2MB

  • memory/5104-133-0x0000000002F80000-0x000000000309C000-memory.dmp
    Filesize

    1.1MB

  • memory/5104-137-0x0000000002F80000-0x000000000309C000-memory.dmp
    Filesize

    1.1MB

  • memory/8660-138-0x0000000000FB0000-0x00000000010CC000-memory.dmp
    Filesize

    1.1MB

  • memory/8660-139-0x0000000000FC33C0-mapping.dmp
  • memory/8660-141-0x0000000000EF0000-0x0000000000FAB000-memory.dmp
    Filesize

    748KB

  • memory/8660-143-0x0000000000EF0000-0x0000000000FAB000-memory.dmp
    Filesize

    748KB