Analysis

  • max time kernel
    192s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 22:39

General

  • Target

    b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exe

  • Size

    676KB

  • MD5

    d848b72d1f7fc6a056bcc576897feff5

  • SHA1

    b69f8527ae4f0f58034b072f15a150939f8db747

  • SHA256

    b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5

  • SHA512

    14f95c1a6c265bf5166b2987c7faf6d4bc4fc725d8607878e0a82a78ae055be7061e94beacbf73aec1a1194807b3212629c762caa4efda76faafe6ce144d19ed

  • SSDEEP

    12288:8K2mhAMJ/cPlUvVAeV2id7GPKirXxpz7A+TIP2WmcyoDJvmwD88y2fYZKknCHfoE:p2O/GlUvVAWd+rBp/1TC2WmcyCtz88yq

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exe
    "C:\Users\Admin\AppData\Local\Temp\b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\AppData\Local\Temp\repair\ygLHgdjnToq.exe
      "C:\Users\Admin\AppData\Local\Temp\repair\ygLHgdjnToq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
        3⤵
          PID:3060
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 80
            4⤵
            • Program crash
            PID:4212
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3060 -ip 3060
      1⤵
        PID:788

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\repair\ygLHgdjnToq.exe
        Filesize

        992KB

        MD5

        3827071ae95dcfbfd0ca2b612a445275

        SHA1

        44232ee645620e9ea7f48780c3c04d7148604ab4

        SHA256

        eab051cab7ea2f7bc5cf8fd9d0e4e1d96de2ec0a7e7e739449caaf301b9a192a

        SHA512

        6fc0fd581c7a743ff4d5dd64459e9b833e3b3a9388ec4dc4fa3ae8c55eb6a84233a1dfa4c6cbfc7b076e368b5ab4b7a9c1da549e421f0063030d6c0a7aba2c8b

      • C:\Users\Admin\AppData\Local\Temp\repair\ygLHgdjnToq.exe
        Filesize

        992KB

        MD5

        3827071ae95dcfbfd0ca2b612a445275

        SHA1

        44232ee645620e9ea7f48780c3c04d7148604ab4

        SHA256

        eab051cab7ea2f7bc5cf8fd9d0e4e1d96de2ec0a7e7e739449caaf301b9a192a

        SHA512

        6fc0fd581c7a743ff4d5dd64459e9b833e3b3a9388ec4dc4fa3ae8c55eb6a84233a1dfa4c6cbfc7b076e368b5ab4b7a9c1da549e421f0063030d6c0a7aba2c8b

      • memory/3060-135-0x0000000000000000-mapping.dmp
      • memory/4928-132-0x0000000000000000-mapping.dmp