Analysis

  • max time kernel
    153s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 11:31

General

  • Target

    3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe

  • Size

    2.0MB

  • MD5

    56210dd82506f4ed55835af8c6ddc0e0

  • SHA1

    cb8f8d51d903589d80ea523f88f4ba02a1e779da

  • SHA256

    3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e

  • SHA512

    7c209b50669b8e8aaaf3fd58db361f67dad1831c027e62a8412fcfc7208babcb3f10922344a661edd278e76567dfccdbfd86f42bc6456100b59ae6cc047ad59a

  • SSDEEP

    24576:B2KrlpxUxHoFhp/S1AWmQO18C2BwfTs6T22CKRJqNE4u6FOcnDsHspz8vlX9xRBW:BTDxB8CWwfTX3clnBowjmE

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe
    "C:\Users\Admin\AppData\Local\Temp\3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks computer location settings
    • Enumerates connected drives
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c net stop Spooler
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4520
      • C:\Windows\SysWOW64\net.exe
        net stop Spooler
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3812
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop Spooler
          4⤵
            PID:2080
      • C:\Windows\SysWOW64\tcpsvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\3f7e30c503657c49f71c7519042b8283b7f12132de09860aa9dbc5afd45c7a5e2.exe"
        2⤵
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        PID:3776
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c net start Spooler
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1808
        • C:\Windows\SysWOW64\net.exe
          net start Spooler
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3384
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start Spooler
            4⤵
              PID:1928
      • C:\Windows\System32\spoolsv.exe
        C:\Windows\System32\spoolsv.exe
        1⤵
          PID:1860

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1808-311-0x0000000000000000-mapping.dmp

        • memory/1928-313-0x0000000000000000-mapping.dmp

        • memory/2080-135-0x0000000000000000-mapping.dmp

        • memory/3384-312-0x0000000000000000-mapping.dmp

        • memory/3776-179-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-156-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-153-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-154-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-180-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-157-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-155-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-158-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-159-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-160-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-161-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-162-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-163-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-164-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-166-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-167-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-165-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-168-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-169-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-170-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-171-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-172-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-173-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-174-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-175-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-177-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-176-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-178-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-145-0x0000000010000000-0x0000000010101000-memory.dmp

          Filesize

          1.0MB

        • memory/3776-152-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-181-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-182-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-183-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-184-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-185-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-186-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-187-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-188-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-189-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-190-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-191-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-192-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-193-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-194-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-195-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-196-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-197-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-198-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-199-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-200-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-201-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-144-0x0000000000000000-mapping.dmp

        • memory/3776-149-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-146-0x000000007F140000-0x000000007F146000-memory.dmp

          Filesize

          24KB

        • memory/3776-310-0x0000000010000000-0x0000000010101000-memory.dmp

          Filesize

          1.0MB

        • memory/3812-134-0x0000000000000000-mapping.dmp

        • memory/4504-309-0x0000000003FD0000-0x00000000040D1000-memory.dmp

          Filesize

          1.0MB

        • memory/4504-136-0x000000007FE40000-0x000000007FE4E000-memory.dmp

          Filesize

          56KB

        • memory/4504-132-0x0000000003FD0000-0x00000000040D1000-memory.dmp

          Filesize

          1.0MB

        • memory/4520-133-0x0000000000000000-mapping.dmp