Analysis

  • max time kernel
    376s
  • max time network
    433s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 21:33

General

  • Target

    05a3ae0b0e40549f4fd3d2256ca1614ebf8c3265a0bc1972e974e8f668a35c9d.exe

  • Size

    112KB

  • MD5

    7706876568542419a64f5e0a48d322b1

  • SHA1

    3b6abe527b2da5c119a452d06891566e7e01b376

  • SHA256

    05a3ae0b0e40549f4fd3d2256ca1614ebf8c3265a0bc1972e974e8f668a35c9d

  • SHA512

    ea878b336946fbad4229eb60207265b1c66e0f8ef7c8d3e97c61e0341e92d3307f4290abcaa0211eea95fdf435522e0c5d347bbe09c4a32764bac99559daf5f9

  • SSDEEP

    3072:TRm3h5i0hA95TJ4tzzzzzzzzzzzzzzzzzzzzzzzzzzz+a6/md31Rq3F:TRmbic44zzzzzzzzzzzzzzzzzzzzzzzW

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05a3ae0b0e40549f4fd3d2256ca1614ebf8c3265a0bc1972e974e8f668a35c9d.exe
    "C:\Users\Admin\AppData\Local\Temp\05a3ae0b0e40549f4fd3d2256ca1614ebf8c3265a0bc1972e974e8f668a35c9d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Users\Admin\AppData\Local\Temp\05a3ae0b0e40549f4fd3d2256ca1614ebf8c3265a0bc1972e974e8f668a35c9d.exe
      C:\Users\Admin\AppData\Local\Temp\05a3ae0b0e40549f4fd3d2256ca1614ebf8c3265a0bc1972e974e8f668a35c9d.exe
      2⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4536
        • C:\Windows\SysWOW64\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\05a3ae0b0e40549f4fd3d2256ca1614ebf8c3265a0bc1972e974e8f668a35c9d.txt
          4⤵
          • Opens file in notepad (likely ransom note)
          PID:1560

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\05a3ae0b0e40549f4fd3d2256ca1614ebf8c3265a0bc1972e974e8f668a35c9d.txt

    Filesize

    5B

    MD5

    43fb2705d9766ea761f934981936503f

    SHA1

    c9589c81355baab345cd121a76dcd743d65e131c

    SHA256

    766a90366e6cac315d05afc9c97dcd6206a7f66da260dd41d209bb6ad13947e0

    SHA512

    ebf82587e4a8dad580b0c6c6959c73315c584cea82c41c073aab41854a44027fbc63d3f360651e726bfe71bc9e99a1b803574715e63d462f90182291ce3dfbf4

  • memory/524-132-0x0000000000000000-mapping.dmp

  • memory/524-133-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/524-136-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1560-140-0x0000000000000000-mapping.dmp

  • memory/4536-135-0x0000000000000000-mapping.dmp

  • memory/4536-137-0x00000000001E0000-0x00000000001EE000-memory.dmp

    Filesize

    56KB

  • memory/4536-138-0x00000000001F0000-0x00000000001F8000-memory.dmp

    Filesize

    32KB

  • memory/4536-139-0x0000000000A00000-0x0000000000A80000-memory.dmp

    Filesize

    512KB