Analysis

  • max time kernel
    152s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 01:29

General

  • Target

    8eec44c4624e4e41e8c8cedddbc05f206aafede5ed580f85fedc3a10fc768c31.exe

  • Size

    68KB

  • MD5

    c70c332e91e26d3c9275538832957e10

  • SHA1

    c22afac942be0130171260717100647c14e0e0f5

  • SHA256

    8eec44c4624e4e41e8c8cedddbc05f206aafede5ed580f85fedc3a10fc768c31

  • SHA512

    360d883ec3c1f05e891ed62a41803d32f827a530ac1c189d903878e2ac63132f71b994a6f58065f621c770f9a0ad57eaff23ca1afd5f8fd5707c5632cd98682b

  • SSDEEP

    1536:vMXxVulAmfx/Wz30ZkHuM4ymdgIfG133EqKopXIwOpruPGBxrzbu1N3XloBMot0E:0sVS3Ckr0NCJpXBkruPG73A+TG3

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 2 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
      PID:788
    • C:\Users\Admin\AppData\Local\Temp\8eec44c4624e4e41e8c8cedddbc05f206aafede5ed580f85fedc3a10fc768c31.exe
      "C:\Users\Admin\AppData\Local\Temp\8eec44c4624e4e41e8c8cedddbc05f206aafede5ed580f85fedc3a10fc768c31.exe"
      1⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s C:\Users\Admin\AppData\Local\Temp\~~e575081.tmp ,C:\Users\Admin\AppData\Local\Temp\8eec44c4624e4e41e8c8cedddbc05f206aafede5ed580f85fedc3a10fc768c31.exe
        2⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3784
        • C:\Windows\SysWOW64\takeown.exe
          takeown /f "C:\Windows\system32\rpcss.dll"
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • Suspicious use of AdjustPrivilegeToken
          PID:3168
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Windows\system32\rpcss.dll" /grant administrators:F
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:4164

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~~e575081.tmp

      Filesize

      1.0MB

      MD5

      4c799a142069f952513246e3eeb0493e

      SHA1

      81cac70c5f6efe785f779a0e1099f70f4c34a08b

      SHA256

      56ff5ebd94a6c7d10490023533236fbcff37dfc02965c5d2107e7450c80e9a9a

      SHA512

      ae6a99f682f792c9eec3ff9073458f460ba15fc6765caa19fcd6ae27e1dcb502f43dc3c3149d7384f5dfcb44c1e8f27eecedfd1963d39c9c8716a4dcf8b53f8f

    • C:\Users\Admin\AppData\Local\Temp\~~e575081.tmp

      Filesize

      1.0MB

      MD5

      4c799a142069f952513246e3eeb0493e

      SHA1

      81cac70c5f6efe785f779a0e1099f70f4c34a08b

      SHA256

      56ff5ebd94a6c7d10490023533236fbcff37dfc02965c5d2107e7450c80e9a9a

      SHA512

      ae6a99f682f792c9eec3ff9073458f460ba15fc6765caa19fcd6ae27e1dcb502f43dc3c3149d7384f5dfcb44c1e8f27eecedfd1963d39c9c8716a4dcf8b53f8f

    • memory/3168-136-0x0000000000000000-mapping.dmp

    • memory/3784-133-0x0000000000000000-mapping.dmp

    • memory/4164-137-0x0000000000000000-mapping.dmp

    • memory/4596-132-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB