Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 08:55

General

  • Target

    59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe

  • Size

    61KB

  • MD5

    2580de40d6e84cf1fc95c52924a55090

  • SHA1

    38b010e0c2a83f2698d3a61a1ec9fc52e632471f

  • SHA256

    59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761

  • SHA512

    c4ecfd87d99c01c2d3091002428faf469b02342fe4fe02e3fe090d86e4857fb3f3195bf338007d815b5a148b92cdad826f9414a6ac3552ff96c6eced38950e12

  • SSDEEP

    1536:/Wud/0Igp1yctpQUSrQiyOcfI1J09BtnlkCVo+KsJGUp:/Jd/0Im3I1KBtlro+KsJGUp

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe
    "C:\Users\Admin\AppData\Local\Temp\59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\windows\system32\s4c.vbs"
      2⤵
        PID:4240
      • C:\ProgramData\Kaspersky PURE 3.0.exe
        "C:\ProgramData\Kaspersky PURE 3.0.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Drops startup file
        • Adds Run key to start application
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3160
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\windows\system32\s4c.vbs"
          3⤵
            PID:4548
          • C:\Windows\SYSTEM32\netsh.exe
            netsh firewall add allowedprogram "C:\ProgramData\Kaspersky PURE 3.0.exe" "Kaspersky PURE 3.0.exe" ENABLE
            3⤵
            • Modifies Windows Firewall
            PID:2704

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Kaspersky PURE 3.0.exe

        Filesize

        61KB

        MD5

        2580de40d6e84cf1fc95c52924a55090

        SHA1

        38b010e0c2a83f2698d3a61a1ec9fc52e632471f

        SHA256

        59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761

        SHA512

        c4ecfd87d99c01c2d3091002428faf469b02342fe4fe02e3fe090d86e4857fb3f3195bf338007d815b5a148b92cdad826f9414a6ac3552ff96c6eced38950e12

      • C:\ProgramData\Kaspersky PURE 3.0.exe

        Filesize

        61KB

        MD5

        2580de40d6e84cf1fc95c52924a55090

        SHA1

        38b010e0c2a83f2698d3a61a1ec9fc52e632471f

        SHA256

        59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761

        SHA512

        c4ecfd87d99c01c2d3091002428faf469b02342fe4fe02e3fe090d86e4857fb3f3195bf338007d815b5a148b92cdad826f9414a6ac3552ff96c6eced38950e12

      • memory/3160-137-0x00007FFBDA8B0000-0x00007FFBDB2E6000-memory.dmp

        Filesize

        10.2MB

      • memory/4868-132-0x00007FFBDA8B0000-0x00007FFBDB2E6000-memory.dmp

        Filesize

        10.2MB