Analysis

  • max time kernel
    169s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2022, 21:35

General

  • Target

    a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c.exe

  • Size

    113KB

  • MD5

    8a1794df4ad921e999b3fa57e7d5f51e

  • SHA1

    23fec1d678d160bd97d7c667eeb9294bf37bb58c

  • SHA256

    a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c

  • SHA512

    c492bcb366a527b5ef5578e57f2a078ae8b947f823964c555c3f640e84c456eafdf858296d55d5a6f30e54ff6eedb5749af6dfe6d25a1514479db7ab1ef1e4ed

  • SSDEEP

    3072:aemcyqFcEJrRL5JbfHmTy6ol2M5bh85VN+umgLFIq:ai1Fz7mMkc18PNIgJ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c.exe
    "C:\Users\Admin\AppData\Local\Temp\a588fc229870db8b58ac4d9fc471907bf571283f70a5678e55fd815d729ee02c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3676
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Gzf..bat" > nul 2> nul
      2⤵
        PID:2708

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Gzf..bat

      Filesize

      274B

      MD5

      862d17506e4da4b4a7289d808a0852aa

      SHA1

      a19d304860d446acff542efbb12dd8621754620f

      SHA256

      ccc1cf4a778601cde9beedd726373b64ef966cf4e167398707f208c90ad2fc9f

      SHA512

      3ad5d1628d0fdce9347e0ea881773701ae51b589da194481a43d2015891bed3020e4a8bc82ce768eed3af229cfa5dfe823a5982863da888672e1bf05e58251ec

    • memory/3676-132-0x0000000000400000-0x0000000000420A00-memory.dmp

      Filesize

      130KB

    • memory/3676-133-0x0000000000400000-0x0000000000420A00-memory.dmp

      Filesize

      130KB

    • memory/3676-135-0x0000000000400000-0x0000000000420A00-memory.dmp

      Filesize

      130KB