Analysis

  • max time kernel
    178s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 02:42

General

  • Target

    7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe

  • Size

    124KB

  • MD5

    e9d7a795203bfd970d41ebe2fa0c349d

  • SHA1

    6226dec7b14e6e73d249e74604a4d83c4000c8f4

  • SHA256

    7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d

  • SHA512

    cf1588c7e0dedbf06c4106446b4654aab90d7ba7e67f3e2b7078ac20524eb119fb9a948252fd84799018c9362e8b257d1cef21963c2b33ea3e5a62d6c08c1236

  • SSDEEP

    3072:cyl1eDqcgO5q6VE5Dgij5IyEKoKdBgYOP/TqHueMsuf:cylDE5bXIdHoK5ITqHueC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe
    "C:\Users\Admin\AppData\Local\Temp\7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:444
    • C:\Users\Admin\AppData\Local\Temp\7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe
      "C:\Users\Admin\AppData\Local\Temp\7fe1b45d997df7763d60664452a92171af11a9c0e5e7eb8c0e5948eede3eb96d.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4336
      • C:\Windows\notepad.exe
        "C:\Windows\notepad.exe"
        3⤵
          PID:2820

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/444-132-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/444-140-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/4336-134-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/4336-135-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/4336-136-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/4336-137-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/4336-139-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB