Analysis

  • max time kernel
    189s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/11/2022, 05:01

General

  • Target

    8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe

  • Size

    356KB

  • MD5

    4858fb78c4c4129c8f90d5db7d212ae4

  • SHA1

    682d27589ebadc5cea5bb9a5a22b9bc70323fca7

  • SHA256

    8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0

  • SHA512

    130d5287ed44df8a1f6aac80c3eb4a905a55c55a3c63f547ac4f5810955824f0f8f2b3ef0ae1ca3bdc876c9064843281f688db3ad3b0853b899b0b84cbef63f4

  • SSDEEP

    3072:GUANCc//////YXTJNDNV3AqS3rm+D7KNB34y2ppFjFS3:zc//////yTJnV3ABr376j2ppFRY

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs .reg file with regedit 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe
    "C:\Users\Admin\AppData\Local\Temp\8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Users\Admin\AppData\Local\Temp\8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe
      C:\Users\Admin\AppData\Local\Temp\8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\wuauclt.exe
        "C:\Windows\wuauclt.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4916
        • C:\Windows\wuauclt.exe
          C:\Windows\wuauclt.exe
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:552
          • C:\Windows\SysWOW64\regedit.exe
            "C:\Windows\System32\regedit.exe" /s C:\Windows\noruns.reg
            5⤵
            • Runs .reg file with regedit
            PID:216
          • C:\Windows\SysWOW64\net.exe
            "C:\Windows\System32\net.exe" stop sharedaccess
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2992
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop sharedaccess
              6⤵
                PID:2516
            • C:\Windows\SysWOW64\net.exe
              "C:\Windows\System32\net.exe" stop KVWSC
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2736
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop KVWSC
                6⤵
                  PID:772
              • C:\Windows\SysWOW64\sc.exe
                "C:\Windows\System32\sc.exe" config KVWSC start= disabled
                5⤵
                • Launches sc.exe
                PID:5084
              • C:\Windows\SysWOW64\net.exe
                "C:\Windows\System32\net.exe" stop KVSrvXP
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2816
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop KVSrvXP
                  6⤵
                    PID:424
                • C:\Windows\SysWOW64\sc.exe
                  "C:\Windows\System32\sc.exe" config KVSrvXP start= disabled
                  5⤵
                  • Launches sc.exe
                  PID:864
                • C:\Windows\SysWOW64\net.exe
                  "C:\Windows\System32\net.exe" stop kavsvc
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3092
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop kavsvc
                    6⤵
                      PID:4120
                  • C:\Windows\SysWOW64\sc.exe
                    "C:\Windows\System32\sc.exe" config kavsvc start= disabled
                    5⤵
                    • Launches sc.exe
                    PID:2304
                  • C:\Windows\SysWOW64\sc.exe
                    "C:\Windows\System32\sc.exe" config RsRavMon start= disabled
                    5⤵
                    • Launches sc.exe
                    PID:1868
                  • C:\Windows\SysWOW64\net.exe
                    "C:\Windows\System32\net.exe" stop RsCCenter
                    5⤵
                      PID:2164
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop RsCCenter
                        6⤵
                          PID:3736
                      • C:\Windows\SysWOW64\sc.exe
                        "C:\Windows\System32\sc.exe" config RsCCenter start= disabled
                        5⤵
                        • Launches sc.exe
                        PID:3244
                      • C:\Windows\SysWOW64\net.exe
                        "C:\Windows\System32\net.exe" stop RsRavMon
                        5⤵
                          PID:1688
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop RsRavMon
                            6⤵
                              PID:1628
                      • C:\Windows\SysWOW64\regedit.exe
                        "C:\Windows\System32\regedit.exe" /s C:\Windows\noruns.reg
                        3⤵
                        • Runs .reg file with regedit
                        PID:4468

                  Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\noruns.reg

                          Filesize

                          122B

                          MD5

                          704f9f14e6c5b902de15f37bbb234bbc

                          SHA1

                          4e7bd14012b5fe1b07b9ed99a00565ed1d86348b

                          SHA256

                          69c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4

                          SHA512

                          02376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042

                        • C:\Windows\noruns.reg

                          Filesize

                          122B

                          MD5

                          704f9f14e6c5b902de15f37bbb234bbc

                          SHA1

                          4e7bd14012b5fe1b07b9ed99a00565ed1d86348b

                          SHA256

                          69c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4

                          SHA512

                          02376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042

                        • C:\Windows\wuauclt.exe

                          Filesize

                          356KB

                          MD5

                          4858fb78c4c4129c8f90d5db7d212ae4

                          SHA1

                          682d27589ebadc5cea5bb9a5a22b9bc70323fca7

                          SHA256

                          8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0

                          SHA512

                          130d5287ed44df8a1f6aac80c3eb4a905a55c55a3c63f547ac4f5810955824f0f8f2b3ef0ae1ca3bdc876c9064843281f688db3ad3b0853b899b0b84cbef63f4

                        • C:\Windows\wuauclt.exe

                          Filesize

                          356KB

                          MD5

                          4858fb78c4c4129c8f90d5db7d212ae4

                          SHA1

                          682d27589ebadc5cea5bb9a5a22b9bc70323fca7

                          SHA256

                          8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0

                          SHA512

                          130d5287ed44df8a1f6aac80c3eb4a905a55c55a3c63f547ac4f5810955824f0f8f2b3ef0ae1ca3bdc876c9064843281f688db3ad3b0853b899b0b84cbef63f4

                        • C:\Windows\wuauclt.exe

                          Filesize

                          356KB

                          MD5

                          4858fb78c4c4129c8f90d5db7d212ae4

                          SHA1

                          682d27589ebadc5cea5bb9a5a22b9bc70323fca7

                          SHA256

                          8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0

                          SHA512

                          130d5287ed44df8a1f6aac80c3eb4a905a55c55a3c63f547ac4f5810955824f0f8f2b3ef0ae1ca3bdc876c9064843281f688db3ad3b0853b899b0b84cbef63f4

                        • memory/552-154-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/552-155-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1672-134-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1672-137-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1672-138-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1672-139-0x0000000010000000-0x0000000010059000-memory.dmp

                          Filesize

                          356KB

                        • memory/1672-144-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/3488-132-0x0000000010000000-0x0000000010059000-memory.dmp

                          Filesize

                          356KB

                        • memory/3488-136-0x0000000010000000-0x0000000010059000-memory.dmp

                          Filesize

                          356KB

                        • memory/4916-150-0x0000000010000000-0x0000000010059000-memory.dmp

                          Filesize

                          356KB