Analysis

  • max time kernel
    189s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 17:58

General

  • Target

    e1d63956ed3d44aa0eb19c4964c1b84909fde1ab5e96d99812684ac9341f6100.exe

  • Size

    1.4MB

  • MD5

    71cf9e17f89c88d5e287017149e04af8

  • SHA1

    a822a06b3efaea3a17bfb8d17e549f8a904bba2a

  • SHA256

    e1d63956ed3d44aa0eb19c4964c1b84909fde1ab5e96d99812684ac9341f6100

  • SHA512

    74e7f8af01a77716a0a6625ede3b0d8cac50c1f93f27eb146248c4d32737268fb26f3d7da0db6f9b5b5d5189f63b2007d94f80d61fc92b9b70dfe406c0fc0437

  • SSDEEP

    24576:YDOdboF3zDAL08WR42XibVaUXWskvhSrC6DDNbswu6aJ2k:Jg3wzAl6XxkpODNbRah

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1d63956ed3d44aa0eb19c4964c1b84909fde1ab5e96d99812684ac9341f6100.exe
    "C:\Users\Admin\AppData\Local\Temp\e1d63956ed3d44aa0eb19c4964c1b84909fde1ab5e96d99812684ac9341f6100.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Windows\SysWOW64\cmd.exe
      /c net stop MpsSvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4696
      • C:\Windows\SysWOW64\net.exe
        net stop MpsSvc
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1936
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop MpsSvc
          4⤵
            PID:1784
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Users\Admin\AppData\Local\Temp\FB_FDD9.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\FB_FDD9.tmp.exe"
          3⤵
          • Executes dropped EXE
          • Modifies Installed Components in the registry
          • Adds Run key to start application
          PID:3372
      • C:\Users\Admin\AppData\Local\Temp\e1d63956ed3d44aa0eb19c4964c1b84909fde1ab5e96d99812684ac9341f6100.exe
        C:\Users\Admin\AppData\Local\Temp\e1d63956ed3d44aa0eb19c4964c1b84909fde1ab5e96d99812684ac9341f6100.exe
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Users\Admin\AppData\Local\Temp\FB_FDCA.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\FB_FDCA.tmp.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:1292
          • C:\Users\Admin\AppData\Roaming\Install\Host.exe
            "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
            4⤵
            • Executes dropped EXE
            PID:4576

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    2
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\FB_FDCA.tmp.exe
      Filesize

      68KB

      MD5

      f3208f5f678309f72534b7495e59a732

      SHA1

      907dc10816898f14a5f9c8fc8871342f709b4467

      SHA256

      e9c3ee481ec43c32e05b36790bd067f67cf07c06a923f9c5d276d2b216bf64e2

      SHA512

      523a38a8d4d1e31a8c82d8e06f4ad511e252f79f83a57abbd9841d52f9691c802bd6b5b7b59f23f3ab19821b82890440566f9f17e820bc582f6801e616a86ac5

    • C:\Users\Admin\AppData\Local\Temp\FB_FDCA.tmp.exe
      Filesize

      68KB

      MD5

      f3208f5f678309f72534b7495e59a732

      SHA1

      907dc10816898f14a5f9c8fc8871342f709b4467

      SHA256

      e9c3ee481ec43c32e05b36790bd067f67cf07c06a923f9c5d276d2b216bf64e2

      SHA512

      523a38a8d4d1e31a8c82d8e06f4ad511e252f79f83a57abbd9841d52f9691c802bd6b5b7b59f23f3ab19821b82890440566f9f17e820bc582f6801e616a86ac5

    • C:\Users\Admin\AppData\Local\Temp\FB_FDD9.tmp.exe
      Filesize

      68KB

      MD5

      f3208f5f678309f72534b7495e59a732

      SHA1

      907dc10816898f14a5f9c8fc8871342f709b4467

      SHA256

      e9c3ee481ec43c32e05b36790bd067f67cf07c06a923f9c5d276d2b216bf64e2

      SHA512

      523a38a8d4d1e31a8c82d8e06f4ad511e252f79f83a57abbd9841d52f9691c802bd6b5b7b59f23f3ab19821b82890440566f9f17e820bc582f6801e616a86ac5

    • C:\Users\Admin\AppData\Local\Temp\FB_FDD9.tmp.exe
      Filesize

      68KB

      MD5

      f3208f5f678309f72534b7495e59a732

      SHA1

      907dc10816898f14a5f9c8fc8871342f709b4467

      SHA256

      e9c3ee481ec43c32e05b36790bd067f67cf07c06a923f9c5d276d2b216bf64e2

      SHA512

      523a38a8d4d1e31a8c82d8e06f4ad511e252f79f83a57abbd9841d52f9691c802bd6b5b7b59f23f3ab19821b82890440566f9f17e820bc582f6801e616a86ac5

    • C:\Users\Admin\AppData\Roaming\Install\Host.exe
      Filesize

      68KB

      MD5

      f3208f5f678309f72534b7495e59a732

      SHA1

      907dc10816898f14a5f9c8fc8871342f709b4467

      SHA256

      e9c3ee481ec43c32e05b36790bd067f67cf07c06a923f9c5d276d2b216bf64e2

      SHA512

      523a38a8d4d1e31a8c82d8e06f4ad511e252f79f83a57abbd9841d52f9691c802bd6b5b7b59f23f3ab19821b82890440566f9f17e820bc582f6801e616a86ac5

    • C:\Users\Admin\AppData\Roaming\Install\Host.exe
      Filesize

      68KB

      MD5

      f3208f5f678309f72534b7495e59a732

      SHA1

      907dc10816898f14a5f9c8fc8871342f709b4467

      SHA256

      e9c3ee481ec43c32e05b36790bd067f67cf07c06a923f9c5d276d2b216bf64e2

      SHA512

      523a38a8d4d1e31a8c82d8e06f4ad511e252f79f83a57abbd9841d52f9691c802bd6b5b7b59f23f3ab19821b82890440566f9f17e820bc582f6801e616a86ac5

    • memory/1292-142-0x0000000000000000-mapping.dmp
    • memory/1784-140-0x0000000000000000-mapping.dmp
    • memory/1824-132-0x0000000000BC0000-0x0000000000BC4000-memory.dmp
      Filesize

      16KB

    • memory/1936-134-0x0000000000000000-mapping.dmp
    • memory/2404-136-0x0000000000400000-0x00000000004EC000-memory.dmp
      Filesize

      944KB

    • memory/2404-139-0x0000000000400000-0x00000000004EC000-memory.dmp
      Filesize

      944KB

    • memory/2404-138-0x0000000000400000-0x00000000004EC000-memory.dmp
      Filesize

      944KB

    • memory/2404-135-0x0000000000000000-mapping.dmp
    • memory/3372-141-0x0000000000000000-mapping.dmp
    • memory/4576-147-0x0000000000000000-mapping.dmp
    • memory/4696-133-0x0000000000000000-mapping.dmp