Analysis

  • max time kernel
    240s
  • max time network
    326s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 19:10

General

  • Target

    5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe

  • Size

    201KB

  • MD5

    d844ce144ed2e61ffa31e18cd862b60f

  • SHA1

    95ed5006bf6f24900bab497829791625d88b8912

  • SHA256

    5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99

  • SHA512

    21e46be9bff85172a788138579892aab05033e56591e7541cd7b92682058bf7bcaf2491cd4beff1b6e2026ddfeebd71fadd2629f21b98934252cb58a51004a5c

  • SSDEEP

    3072:3uXG1BWNVI6vqC/0Q7cNyzu5LM7b1uI+1dqdukkvs1C8/ehoraNUXcQDL2Em:FWNNzuAMIGpvs1C8/ehoraNUXZDKEm

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe
    "C:\Users\Admin\AppData\Local\Temp\5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8922.bat" "C:\Users\Admin\AppData\Local\Temp\5eda3e3c0e8604710413d0e5d8702699aa1cb76c73fd586e7e2d8d40f6d41b99.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 1000
        3⤵
        • Runs ping.exe
        PID:4496
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 1000
        3⤵
        • Runs ping.exe
        PID:1856
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 1000
        3⤵
        • Runs ping.exe
        PID:4008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8922.bat

    Filesize

    205B

    MD5

    af942e21a17f04903c52cb28a9b89542

    SHA1

    ebcfe47bad384564346db4141d26e3e68f9f984f

    SHA256

    c62a90b84dac61f74122f6eaa01665155a18b28a68b799a963f8a877194f922d

    SHA512

    790decec1485e8fc42c3ee09a3e871ee95fdf2bf2e5f15556de0a5b5db2106114d79206acf2dcf3e7c0dbe9df7b1298e0b3f7247a34d9d3bd9f296cc9b61211a

  • memory/1672-132-0x0000000000000000-mapping.dmp

  • memory/1856-135-0x0000000000000000-mapping.dmp

  • memory/4008-136-0x0000000000000000-mapping.dmp

  • memory/4496-134-0x0000000000000000-mapping.dmp