Analysis

  • max time kernel
    156s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 08:33

General

  • Target

    1ef3f59a753e5e6add79ca2c5b2d1bc71de97f7e0a6a158d39d4f7d05a99ceee.exe

  • Size

    185KB

  • MD5

    e9d06e56d4ee9bf7f5ca6c35a473d632

  • SHA1

    1b144cc1988d902243e030ade48bff63e538ff91

  • SHA256

    1ef3f59a753e5e6add79ca2c5b2d1bc71de97f7e0a6a158d39d4f7d05a99ceee

  • SHA512

    78dad1c9621562b093b22e1c016e20a75c2c7480bd444f504edccf87192a7330fd9473d532ed744f7b6f0ff020b0be7d142a4fbe3517022e212f43dbccdd066d

  • SSDEEP

    3072:IDQkrZoosbIfXJsWWZQOoz6kOa2bz2Ti1APXZ0PCeDOxaF7YHUVn94zIXVy:IDpoe6zozCac712XZ0PCeS47YHk94MXs

Score
8/10

Malware Config

Signatures

  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 6 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ef3f59a753e5e6add79ca2c5b2d1bc71de97f7e0a6a158d39d4f7d05a99ceee.exe
    "C:\Users\Admin\AppData\Local\Temp\1ef3f59a753e5e6add79ca2c5b2d1bc71de97f7e0a6a158d39d4f7d05a99ceee.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Users\Admin\AppData\Local\Temp\1ef3f59a753e5e6add79ca2c5b2d1bc71de97f7e0a6a158d39d4f7d05a99ceee.exe
      "C:\Users\Admin\AppData\Local\Temp\1ef3f59a753e5e6add79ca2c5b2d1bc71de97f7e0a6a158d39d4f7d05a99ceee.exe"
      2⤵
      • Sets file execution options in registry
      • Checks computer location settings
      • Checks for any installed AV software in registry
      • Drops desktop.ini file(s)
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:716
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x63AC0846" /TR "C:\ProgramData\randomfolder\bigfpyefz.exe" /RL HIGHEST
        3⤵
        • Creates scheduled task(s)
        PID:4780
      • C:\Windows\SysWOW64\svchost.exe
        -k NetworkService
        3⤵
          PID:4540
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 96
            4⤵
            • Program crash
            PID:2100
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4540 -ip 4540
      1⤵
        PID:4884

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nss1BE6.tmp\criollo.dll

        Filesize

        19KB

        MD5

        ee8a4d32b8d3816b48d71b82c86e9966

        SHA1

        b0a3b44bfe069e8a0adca556b989abae5a200519

        SHA256

        b0c4a65678e38c292ca84ecaa05b0f40711254978ae377092e7fcc2b588b7092

        SHA512

        b471aab4b05c6e91ccd84f906f9203b2683218668a3b41ce58a57948020dea03c3ae1281a17d956419bef0fe3931b274618d069d5503b8aa40fa24a24665f3f0

      • memory/716-134-0x0000000000400000-0x0000000000426000-memory.dmp

        Filesize

        152KB

      • memory/716-136-0x0000000000400000-0x0000000000426000-memory.dmp

        Filesize

        152KB

      • memory/716-138-0x0000000000500000-0x000000000054B000-memory.dmp

        Filesize

        300KB

      • memory/716-139-0x0000000000400000-0x0000000000426000-memory.dmp

        Filesize

        152KB

      • memory/716-140-0x0000000000500000-0x000000000054B000-memory.dmp

        Filesize

        300KB

      • memory/716-141-0x0000000000660000-0x000000000066B000-memory.dmp

        Filesize

        44KB

      • memory/716-143-0x0000000000500000-0x000000000054B000-memory.dmp

        Filesize

        300KB

      • memory/4540-145-0x0000000076EA0000-0x0000000077043000-memory.dmp

        Filesize

        1.6MB