Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 04:23

General

  • Target

    FlashPlayer_16.0.exe

  • Size

    21KB

  • MD5

    d4c1eb69d301dc66f44fc2bca34432a8

  • SHA1

    902a230fedf8b49f8da4d5903abb720d78f6aa38

  • SHA256

    e194bc38c897b530442cab58e01b213ff3cf568ca8f8ea3835a8ae567f7b3321

  • SHA512

    5fadee0a210517a4bdf0827c591e9c764e0ad4c9963797e0a9d140cf14e2f0a542b949d2caff5883112aa339657423632735e7f46ce2d5c1355481f797b25b6e

  • SSDEEP

    384:2b4Ejvk96uLq5NrrrrsU5UrtvP0aK3gqyJg9+XqvOZY5WuNaCVnm:C4E+q5hQ1xRqvgYpm

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FlashPlayer_16.0.exe
    "C:\Users\Admin\AppData\Local\Temp\FlashPlayer_16.0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    PID:4656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4656-132-0x0000000075580000-0x0000000075B31000-memory.dmp

    Filesize

    5.7MB

  • memory/4656-133-0x0000000075580000-0x0000000075B31000-memory.dmp

    Filesize

    5.7MB