Analysis

  • max time kernel
    139s
  • max time network
    214s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 17:02

General

  • Target

    5983df5bde3c35da4eaa684145c9cf413c99ae29decc2088880d5b2ee8af90b3.exe

  • Size

    724KB

  • MD5

    951ddc162aca63083933b40f4fc3c0b9

  • SHA1

    4fa550b4146807e4714219960088cc0a5af6db98

  • SHA256

    5983df5bde3c35da4eaa684145c9cf413c99ae29decc2088880d5b2ee8af90b3

  • SHA512

    9213f0d345ae73039132bc99250f03366f78435a8598fdab2210e9a850f7b1c1b598d58013049ac49148abdbc29993078b892067acdd76b5d604936c595d4927

  • SSDEEP

    12288:vScaAytRpk6f21DgftyF9jJQ/e/AdfwQY3csQv/QrdBgorD3GnZY:agytvk6f2wy9jJQ/e/AdfwQY3ZQv/QrQ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5983df5bde3c35da4eaa684145c9cf413c99ae29decc2088880d5b2ee8af90b3.exe
    "C:\Users\Admin\AppData\Local\Temp\5983df5bde3c35da4eaa684145c9cf413c99ae29decc2088880d5b2ee8af90b3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Users\Admin\AppData\LocalOuTVsCVrca.exe
      "C:\Users\Admin\AppData\LocalOuTVsCVrca.exe"
      2⤵
      • Executes dropped EXE
      PID:4576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalOuTVsCVrca.exe

    Filesize

    698KB

    MD5

    fb6725769d2af5b27e57c2b31e6b8b6b

    SHA1

    cdf314c8591e50cf443e440f0f35f6621f3936b9

    SHA256

    b0331adf3ce97fbf545ae4a3004f4bc0e312aee5b231f40de4a04e55ed7d3bc1

    SHA512

    17eb09832b40cea064a26f1e3d157c9642cd3b1e587e9ba078233cc1ee0a47c7a31d83c2bd9b8a9f5a6acb5663b2f427b350b5582d31b72bbbbafb041cf64c44

  • C:\Users\Admin\AppData\LocalOuTVsCVrca.exe

    Filesize

    698KB

    MD5

    fb6725769d2af5b27e57c2b31e6b8b6b

    SHA1

    cdf314c8591e50cf443e440f0f35f6621f3936b9

    SHA256

    b0331adf3ce97fbf545ae4a3004f4bc0e312aee5b231f40de4a04e55ed7d3bc1

    SHA512

    17eb09832b40cea064a26f1e3d157c9642cd3b1e587e9ba078233cc1ee0a47c7a31d83c2bd9b8a9f5a6acb5663b2f427b350b5582d31b72bbbbafb041cf64c44

  • memory/4576-136-0x0000000075340000-0x00000000758F1000-memory.dmp

    Filesize

    5.7MB

  • memory/4576-137-0x0000000075340000-0x00000000758F1000-memory.dmp

    Filesize

    5.7MB

  • memory/4976-132-0x00007FFF24190000-0x00007FFF24BC6000-memory.dmp

    Filesize

    10.2MB