Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 14:16

General

  • Target

    afef4ac4600d7a1818d247de889d68ac7651d2ad842854d0726b50ba15f61bce.exe

  • Size

    279KB

  • MD5

    d3ece560d7a18b6c0d948a6c6302ec4f

  • SHA1

    acf5e9b9e5093091fc726745bd8ff089a3040934

  • SHA256

    afef4ac4600d7a1818d247de889d68ac7651d2ad842854d0726b50ba15f61bce

  • SHA512

    e23eccb408c71b1abb574968ae21a2a8dbeb7857c95b0efcbe5acd68a077deb454be9a30915ba1a1ef668e17c4e39a792b57fbbec748bd23392f64d4dab7e58e

  • SSDEEP

    6144:x1dlZro5yiyA4AvxE+faCHPJKUuM5NbRtELCe:x1dlZo5yiytAvpPJK4zwLD

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afef4ac4600d7a1818d247de889d68ac7651d2ad842854d0726b50ba15f61bce.exe
    "C:\Users\Admin\AppData\Local\Temp\afef4ac4600d7a1818d247de889d68ac7651d2ad842854d0726b50ba15f61bce.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\Register.exe
      "C:\Users\Admin\AppData\Local\Temp\Register.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Users\Admin\AppData\Roaming\explorer.exe
        "C:\Users\Admin\AppData\Roaming\explorer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:5064
    • C:\Users\Admin\AppData\Local\Temp\Windows8LoopbackManager.exe
      "C:\Users\Admin\AppData\Local\Temp\Windows8LoopbackManager.exe"
      2⤵
      • Executes dropped EXE
      PID:2116

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Register.exe
    Filesize

    144KB

    MD5

    672fb841cddc1584b0e52e0a4508a12a

    SHA1

    7c3b5676bed56ea6d2a45bdcba73c3bf7c3afd2b

    SHA256

    fbb2b8247dfdc696f58ed8ad335ec29f809a76de9b3240d1439225897d83dc8b

    SHA512

    90ea24a4946c38de8f8feb795a65dfe41dabbf135592eb450718d9a50f0e1d66a85bad757ba3b935e7d41fa7b2f1a9a7fad7b8661c41f2002e13362567054326

  • C:\Users\Admin\AppData\Local\Temp\Register.exe
    Filesize

    144KB

    MD5

    672fb841cddc1584b0e52e0a4508a12a

    SHA1

    7c3b5676bed56ea6d2a45bdcba73c3bf7c3afd2b

    SHA256

    fbb2b8247dfdc696f58ed8ad335ec29f809a76de9b3240d1439225897d83dc8b

    SHA512

    90ea24a4946c38de8f8feb795a65dfe41dabbf135592eb450718d9a50f0e1d66a85bad757ba3b935e7d41fa7b2f1a9a7fad7b8661c41f2002e13362567054326

  • C:\Users\Admin\AppData\Local\Temp\Windows8LoopbackManager.exe
    Filesize

    186KB

    MD5

    d7937dce17efb0762b0942bb65bff9d7

    SHA1

    bdd4d85da112311007ab6dbffc4255a445eb9667

    SHA256

    8685fffb468a4fbade430eac70c6fd3fe95f5a89bfb5cc44f1b8b435d85d6fec

    SHA512

    3a9e42522ed61f3714e14fcd6aa5afd97feb5d8434b94d8cdf96a9463a59b643480535e047cd0fc279cdba46f2a5ce45832f4a49d893232eb9ae32a2a6803012

  • C:\Users\Admin\AppData\Local\Temp\Windows8LoopbackManager.exe
    Filesize

    186KB

    MD5

    d7937dce17efb0762b0942bb65bff9d7

    SHA1

    bdd4d85da112311007ab6dbffc4255a445eb9667

    SHA256

    8685fffb468a4fbade430eac70c6fd3fe95f5a89bfb5cc44f1b8b435d85d6fec

    SHA512

    3a9e42522ed61f3714e14fcd6aa5afd97feb5d8434b94d8cdf96a9463a59b643480535e047cd0fc279cdba46f2a5ce45832f4a49d893232eb9ae32a2a6803012

  • C:\Users\Admin\AppData\Roaming\explorer.exe
    Filesize

    144KB

    MD5

    672fb841cddc1584b0e52e0a4508a12a

    SHA1

    7c3b5676bed56ea6d2a45bdcba73c3bf7c3afd2b

    SHA256

    fbb2b8247dfdc696f58ed8ad335ec29f809a76de9b3240d1439225897d83dc8b

    SHA512

    90ea24a4946c38de8f8feb795a65dfe41dabbf135592eb450718d9a50f0e1d66a85bad757ba3b935e7d41fa7b2f1a9a7fad7b8661c41f2002e13362567054326

  • C:\Users\Admin\AppData\Roaming\explorer.exe
    Filesize

    144KB

    MD5

    672fb841cddc1584b0e52e0a4508a12a

    SHA1

    7c3b5676bed56ea6d2a45bdcba73c3bf7c3afd2b

    SHA256

    fbb2b8247dfdc696f58ed8ad335ec29f809a76de9b3240d1439225897d83dc8b

    SHA512

    90ea24a4946c38de8f8feb795a65dfe41dabbf135592eb450718d9a50f0e1d66a85bad757ba3b935e7d41fa7b2f1a9a7fad7b8661c41f2002e13362567054326

  • memory/1932-139-0x00007FFB3D400000-0x00007FFB3DEC1000-memory.dmp
    Filesize

    10.8MB

  • memory/1932-145-0x00007FFB3D400000-0x00007FFB3DEC1000-memory.dmp
    Filesize

    10.8MB

  • memory/1932-135-0x0000000000000000-mapping.dmp
  • memory/1932-138-0x0000000000530000-0x000000000055A000-memory.dmp
    Filesize

    168KB

  • memory/2116-146-0x0000000000000000-mapping.dmp
  • memory/2116-149-0x00000000009F0000-0x0000000000A24000-memory.dmp
    Filesize

    208KB

  • memory/2116-150-0x0000000005FC0000-0x0000000005FC8000-memory.dmp
    Filesize

    32KB

  • memory/2116-151-0x00000000098B0000-0x00000000098E8000-memory.dmp
    Filesize

    224KB

  • memory/2116-152-0x0000000009880000-0x000000000988E000-memory.dmp
    Filesize

    56KB

  • memory/5064-140-0x0000000000000000-mapping.dmp
  • memory/5064-143-0x00007FFB3D400000-0x00007FFB3DEC1000-memory.dmp
    Filesize

    10.8MB

  • memory/5064-144-0x00007FFB3D400000-0x00007FFB3DEC1000-memory.dmp
    Filesize

    10.8MB