Analysis

  • max time kernel
    152s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 05:02

General

  • Target

    46449317872b2a26ab61cd91e65b5b54503b6bd9a506cf8e4559f23069ed52c8.exe

  • Size

    2.1MB

  • MD5

    a39b3bcef6c47615043ad856b01c4297

  • SHA1

    0bf5b007b7371824fba6216060cde937ee7fcdff

  • SHA256

    46449317872b2a26ab61cd91e65b5b54503b6bd9a506cf8e4559f23069ed52c8

  • SHA512

    1a403aa645854a550cb243f90b45de9f14f5b7c6354ba11ee586a4dfdff7047a386d1c218f3afd3382729e9012c253fb1fd2f8c9c3a9c98f7500b8912559fbb3

  • SSDEEP

    49152:CBDvA5WGskLBHgu8As7CfkOqK/pwOjw/ybBzmUpC+osZk:UNkR0gXpwOUKLVosq

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46449317872b2a26ab61cd91e65b5b54503b6bd9a506cf8e4559f23069ed52c8.exe
    "C:\Users\Admin\AppData\Local\Temp\46449317872b2a26ab61cd91e65b5b54503b6bd9a506cf8e4559f23069ed52c8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4832
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /y .\RNXK9tH.H
      2⤵
      • Loads dropped DLL
      PID:1724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RNXK9tH.H

    Filesize

    2.2MB

    MD5

    983fe419ead454df0ad3a46e3c371de4

    SHA1

    7c9f48aa51093e775f4c702c241714624b55d0cc

    SHA256

    28525f904df18b93199dd36e170984ff9cf1f9037490915dee0b8e0a83f3ceca

    SHA512

    dee48a0f0ff4c2ad2ae6fd9823920b6b6852a30c2e87598987ea9639923e630e78e122b7dd84afe06be6b9ab39dc3e13d4527d4085081e757879c68f4ccb75d9

  • C:\Users\Admin\AppData\Local\Temp\RNXk9tH.H

    Filesize

    2.2MB

    MD5

    983fe419ead454df0ad3a46e3c371de4

    SHA1

    7c9f48aa51093e775f4c702c241714624b55d0cc

    SHA256

    28525f904df18b93199dd36e170984ff9cf1f9037490915dee0b8e0a83f3ceca

    SHA512

    dee48a0f0ff4c2ad2ae6fd9823920b6b6852a30c2e87598987ea9639923e630e78e122b7dd84afe06be6b9ab39dc3e13d4527d4085081e757879c68f4ccb75d9

  • memory/1724-132-0x0000000000000000-mapping.dmp

  • memory/1724-135-0x0000000002F80000-0x00000000030B9000-memory.dmp

    Filesize

    1.2MB

  • memory/1724-136-0x00000000031D0000-0x00000000032DF000-memory.dmp

    Filesize

    1.1MB

  • memory/1724-137-0x0000000002F80000-0x00000000030B9000-memory.dmp

    Filesize

    1.2MB

  • memory/1724-138-0x0000000002C70000-0x0000000002D3E000-memory.dmp

    Filesize

    824KB

  • memory/1724-139-0x00000000032E0000-0x000000000339A000-memory.dmp

    Filesize

    744KB

  • memory/1724-142-0x00000000031D0000-0x00000000032DF000-memory.dmp

    Filesize

    1.1MB