Analysis

  • max time kernel
    202s
  • max time network
    212s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 11:39

General

  • Target

    4f9f1934dda720b8af44a52ad1b0b3db6c5ed324e051b65718ce75da79f57569.exe

  • Size

    569KB

  • MD5

    0eab2d9bc5d399eea1b7226ef901b7f9

  • SHA1

    ef85ad30b9a0cb932594d55dc167df302735e980

  • SHA256

    4f9f1934dda720b8af44a52ad1b0b3db6c5ed324e051b65718ce75da79f57569

  • SHA512

    54b60964740f291ffae09053f77227873c707227274625e1b773f85ab727694f51bf47bfc67ecaf420bd4c0b3286ff75555d4ea31aeab4e7e3c61e23c21e13d3

  • SSDEEP

    6144:N8bS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9zHk0:mQtqB5urTIoYWBQk1E+VF9mOx9Q0

Score
9/10

Malware Config

Signatures

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f9f1934dda720b8af44a52ad1b0b3db6c5ed324e051b65718ce75da79f57569.exe
    "C:\Users\Admin\AppData\Local\Temp\4f9f1934dda720b8af44a52ad1b0b3db6c5ed324e051b65718ce75da79f57569.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Users\Admin\AppData\Roaming\Windows Update.exe
      "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4212
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 1276
        3⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:3700

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    569KB

    MD5

    0eab2d9bc5d399eea1b7226ef901b7f9

    SHA1

    ef85ad30b9a0cb932594d55dc167df302735e980

    SHA256

    4f9f1934dda720b8af44a52ad1b0b3db6c5ed324e051b65718ce75da79f57569

    SHA512

    54b60964740f291ffae09053f77227873c707227274625e1b773f85ab727694f51bf47bfc67ecaf420bd4c0b3286ff75555d4ea31aeab4e7e3c61e23c21e13d3

  • C:\Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    569KB

    MD5

    0eab2d9bc5d399eea1b7226ef901b7f9

    SHA1

    ef85ad30b9a0cb932594d55dc167df302735e980

    SHA256

    4f9f1934dda720b8af44a52ad1b0b3db6c5ed324e051b65718ce75da79f57569

    SHA512

    54b60964740f291ffae09053f77227873c707227274625e1b773f85ab727694f51bf47bfc67ecaf420bd4c0b3286ff75555d4ea31aeab4e7e3c61e23c21e13d3

  • memory/3512-132-0x0000000074AE0000-0x0000000075091000-memory.dmp
    Filesize

    5.7MB

  • memory/3512-133-0x0000000074AE0000-0x0000000075091000-memory.dmp
    Filesize

    5.7MB

  • memory/3512-138-0x0000000074AE0000-0x0000000075091000-memory.dmp
    Filesize

    5.7MB

  • memory/3700-140-0x0000000000000000-mapping.dmp
  • memory/4212-134-0x0000000000000000-mapping.dmp
  • memory/4212-137-0x0000000074AE0000-0x0000000075091000-memory.dmp
    Filesize

    5.7MB

  • memory/4212-139-0x0000000074AE0000-0x0000000075091000-memory.dmp
    Filesize

    5.7MB

  • memory/4212-141-0x0000000074AE0000-0x0000000075091000-memory.dmp
    Filesize

    5.7MB