Analysis

  • max time kernel
    183s
  • max time network
    246s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 14:26

General

  • Target

    91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0.exe

  • Size

    367KB

  • MD5

    73cd715094f2de0ef393e0fcb900434a

  • SHA1

    c154b55a5e5ecab16f7b823552861d4d2c5268da

  • SHA256

    91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0

  • SHA512

    7114230f658bf8a633842800299cc45af6ee5a0ea94cd3c9a8100b88cb4ba6780aa5706b19a28209c3e2c79f42542d1e6f2434a745993f9f9d24600031507e7e

  • SSDEEP

    6144:J1dlZro5yiOXUf80T2RwpF4qxTp5TRV2X4NpiVuesYUCpll:J1dlZo5yDAiwp/TptRoX47iwesYll

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:784
      • C:\Users\Admin\AppData\Local\Temp\91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0.exe
        "C:\Users\Admin\AppData\Local\Temp\91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0.exe"
        2⤵
        • Checks computer location settings
        • NTFS ADS
        • Suspicious use of WriteProcessMemory
        PID:5076
        • C:\Extracted\144.exe
          "C:\Extracted\144.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3848
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1136
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:376

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Extracted\144.exe

            Filesize

            260KB

            MD5

            4e584da0797d689f6c4a6c6d683618ae

            SHA1

            371e4cb7065883d5a3d52fbc97bdb38639207177

            SHA256

            ac2e48d514efc085960a28422fcfb17599b8d4cb9c5f6b15a90ca3faf6fd1da3

            SHA512

            9b393d1579736c4bcb1673affae86d5cd526ac9c972d13d102cd9fe859f23d23e8a9835201e7a7f4d4b70826db1d33e1c746fb71c36bd5e286cd385cbc39c816

          • C:\Extracted\144.exe

            Filesize

            260KB

            MD5

            4e584da0797d689f6c4a6c6d683618ae

            SHA1

            371e4cb7065883d5a3d52fbc97bdb38639207177

            SHA256

            ac2e48d514efc085960a28422fcfb17599b8d4cb9c5f6b15a90ca3faf6fd1da3

            SHA512

            9b393d1579736c4bcb1673affae86d5cd526ac9c972d13d102cd9fe859f23d23e8a9835201e7a7f4d4b70826db1d33e1c746fb71c36bd5e286cd385cbc39c816

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

            Filesize

            54KB

            MD5

            5f940a94edf0727a59f16cc502b9d06b

            SHA1

            120446a9aa80d6603ed1ced908b81b7669ad8256

            SHA256

            59cdbdba69bb680b54156f35d26514305fe75886a03054a25bca3af138f12ef6

            SHA512

            f048cfb986723a354cf2715c5f201e47519bcf36fe96616ace56745b6957067c2aeba3fbc2c6a0f98d951072e9b88b16e73d665c4f63ae4cdd8fbaedf8a03271

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

            Filesize

            54KB

            MD5

            5f940a94edf0727a59f16cc502b9d06b

            SHA1

            120446a9aa80d6603ed1ced908b81b7669ad8256

            SHA256

            59cdbdba69bb680b54156f35d26514305fe75886a03054a25bca3af138f12ef6

            SHA512

            f048cfb986723a354cf2715c5f201e47519bcf36fe96616ace56745b6957067c2aeba3fbc2c6a0f98d951072e9b88b16e73d665c4f63ae4cdd8fbaedf8a03271

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

            Filesize

            54KB

            MD5

            5f940a94edf0727a59f16cc502b9d06b

            SHA1

            120446a9aa80d6603ed1ced908b81b7669ad8256

            SHA256

            59cdbdba69bb680b54156f35d26514305fe75886a03054a25bca3af138f12ef6

            SHA512

            f048cfb986723a354cf2715c5f201e47519bcf36fe96616ace56745b6957067c2aeba3fbc2c6a0f98d951072e9b88b16e73d665c4f63ae4cdd8fbaedf8a03271

          • memory/376-153-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/376-152-0x0000000010000000-0x0000000010012000-memory.dmp

            Filesize

            72KB

          • memory/376-150-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/784-145-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

            Filesize

            28KB

          • memory/1136-146-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1136-142-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1136-147-0x0000000010000000-0x0000000010012000-memory.dmp

            Filesize

            72KB

          • memory/3848-143-0x0000000001000000-0x000000000107C000-memory.dmp

            Filesize

            496KB

          • memory/3848-144-0x00000000009F0000-0x0000000000A29000-memory.dmp

            Filesize

            228KB

          • memory/3848-138-0x00000000009F0000-0x0000000000A29000-memory.dmp

            Filesize

            228KB

          • memory/3848-137-0x0000000000520000-0x0000000000524000-memory.dmp

            Filesize

            16KB

          • memory/3848-136-0x0000000001000000-0x000000000107C000-memory.dmp

            Filesize

            496KB

          • memory/3848-135-0x0000000001000000-0x000000000107C000-memory.dmp

            Filesize

            496KB

          • memory/3848-154-0x0000000001000000-0x000000000107C000-memory.dmp

            Filesize

            496KB

          • memory/3848-155-0x00000000009F0000-0x0000000000A29000-memory.dmp

            Filesize

            228KB