Analysis

  • max time kernel
    151s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 08:30

General

  • Target

    SecuriteInfo.com.Win32.RATX-gen.69.exe

  • Size

    1.1MB

  • MD5

    29ac40f119ef04047466b66a44a031bd

  • SHA1

    c9dd1fbe25a6875485d3ea59b8a675810de00c4a

  • SHA256

    8a7a387ec2b16662d29352cba1b58f5b9b0ab65f38bb75aee9e6b88c39a6241b

  • SHA512

    b2fca8a83d601166de20a02434723713a28a0494c4a7bd22c7461aa4cc3328faf3373d90d10b634ffaf6aaa00bf2245e277e96bdfbc9fee0ad9cf146d0d2acb7

  • SSDEEP

    24576:i5RSboSwzn1H18W8DlPyYVROWUrF9H3rue24zKlTo2/zbK5pUmj:ijSa1H183Mv5tbRzKlT5S5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.69.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.69.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:632
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/632-132-0x0000000000660000-0x0000000000782000-memory.dmp

    Filesize

    1.1MB

  • memory/632-133-0x00000000054A0000-0x00000000054C2000-memory.dmp

    Filesize

    136KB

  • memory/4444-134-0x0000000000000000-mapping.dmp

  • memory/4444-135-0x00000000028D0000-0x0000000002906000-memory.dmp

    Filesize

    216KB

  • memory/4444-136-0x00000000055A0000-0x0000000005BC8000-memory.dmp

    Filesize

    6.2MB

  • memory/4444-137-0x0000000005500000-0x0000000005566000-memory.dmp

    Filesize

    408KB

  • memory/4444-138-0x0000000005C40000-0x0000000005CA6000-memory.dmp

    Filesize

    408KB

  • memory/4444-139-0x0000000005BF0000-0x0000000005C0E000-memory.dmp

    Filesize

    120KB

  • memory/4444-140-0x0000000007900000-0x0000000007F7A000-memory.dmp

    Filesize

    6.5MB

  • memory/4444-141-0x0000000000D70000-0x0000000000D8A000-memory.dmp

    Filesize

    104KB