Analysis

  • max time kernel
    210s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 02:15

General

  • Target

    823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe

  • Size

    3.8MB

  • MD5

    5f6ae7b2a016eee0ecd4a54ece4fce6f

  • SHA1

    6a74cd7a9d86ef77fe21d48f2db8420421920687

  • SHA256

    823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c

  • SHA512

    2946bd1a8fa22d9070f72ee72d68092e05d71171422bdd2bf1f8684fdb9b0c480e62b446667b9b742b617d61d4f9c61b905d7388b7d0da989fe7f38ea6ff4c07

  • SSDEEP

    98304:ourAMjG8MOqNwo0cObEOunNsUL7zPfU9+B2ilyL5:jPP6GcObERNfLXs9+BLq

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 13 IoCs
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe
    "C:\Users\Admin\AppData\Local\Temp\823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Users\Admin\AppData\Local\Temp\WINDOWS\setup-4.9.4.exe
      "C:\Users\Admin\AppData\Local\Temp\WINDOWS\setup-4.9.4.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4072
      • C:\Users\Admin\AppData\Local\Temp\is-7NFIQ.tmp\setup-4.9.4.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-7NFIQ.tmp\setup-4.9.4.tmp" /SL5="$C0062,3628408,54272,C:\Users\Admin\AppData\Local\Temp\WINDOWS\setup-4.9.4.exe"
        3⤵
        • Executes dropped EXE
        PID:764
    • C:\Users\Admin\AppData\Local\Temp\WINDOWS\infektor.exe
      "C:\Users\Admin\AppData\Local\Temp\WINDOWS\infektor.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Drops startup file
      • Suspicious use of WriteProcessMemory
      PID:4668
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" engine
          4⤵
          • Executes dropped EXE
          PID:924
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" rk
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: GetForegroundWindowSpam
          PID:4196
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard0
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4596
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard1
            5⤵
            • Executes dropped EXE
            PID:1520
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard1
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4008
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard2
            5⤵
            • Executes dropped EXE
            PID:1736
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard2
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:2192
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard3
            5⤵
            • Executes dropped EXE
            PID:4208
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard3
          4⤵
          • Executes dropped EXE
          PID:628

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WINDOWS\infektor.exe

    Filesize

    53KB

    MD5

    052cbe208ee1678588aa7259571d2a52

    SHA1

    cb4d55542e7709b41aa803bda2cc5e50286335d1

    SHA256

    164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779

    SHA512

    732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27

  • C:\Users\Admin\AppData\Local\Temp\WINDOWS\infektor.exe

    Filesize

    53KB

    MD5

    052cbe208ee1678588aa7259571d2a52

    SHA1

    cb4d55542e7709b41aa803bda2cc5e50286335d1

    SHA256

    164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779

    SHA512

    732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27

  • C:\Users\Admin\AppData\Local\Temp\WINDOWS\setup-4.9.4.exe

    Filesize

    3.7MB

    MD5

    a49540a44cbf54d7442b107ac3237085

    SHA1

    367b1ec3ee6d8e9b2a2542e1660dd123219e0f21

    SHA256

    6078476c3886b0ae600f2731a1fbf907bbff1e39b60243e9e7e8e3c52fb7628c

    SHA512

    0f92c54e995ace41a60e18dd1e5353c395fc14b12981214e75c6e75dcb4529cbdd473a91c9e6c50d4381afbe92c55f7cf49e5522046423d27304e494e531c1d5

  • C:\Users\Admin\AppData\Local\Temp\WINDOWS\setup-4.9.4.exe

    Filesize

    3.7MB

    MD5

    a49540a44cbf54d7442b107ac3237085

    SHA1

    367b1ec3ee6d8e9b2a2542e1660dd123219e0f21

    SHA256

    6078476c3886b0ae600f2731a1fbf907bbff1e39b60243e9e7e8e3c52fb7628c

    SHA512

    0f92c54e995ace41a60e18dd1e5353c395fc14b12981214e75c6e75dcb4529cbdd473a91c9e6c50d4381afbe92c55f7cf49e5522046423d27304e494e531c1d5

  • C:\Users\Admin\AppData\Local\Temp\is-7NFIQ.tmp\setup-4.9.4.tmp

    Filesize

    683KB

    MD5

    ce4e0ff83ac2a3256fd5c220562294a1

    SHA1

    72429c43cc4ed0a184a9c7b208902005489ff49a

    SHA256

    130ec61d37b76fa26a4c7ebcf210467c5be3ae2ace7346546c65f093478bb06b

    SHA512

    b375a78ca9b8e30ba665d3934716e5d3ac5737d8cf05a562f59c8b142923e3a79f1c44b55e995bd43fd0a9056a122cbe332d33947f626fa2d5bfb9f2e1824e98

  • C:\Users\Admin\AppData\Local\Temp\is-7NFIQ.tmp\setup-4.9.4.tmp

    Filesize

    683KB

    MD5

    ce4e0ff83ac2a3256fd5c220562294a1

    SHA1

    72429c43cc4ed0a184a9c7b208902005489ff49a

    SHA256

    130ec61d37b76fa26a4c7ebcf210467c5be3ae2ace7346546c65f093478bb06b

    SHA512

    b375a78ca9b8e30ba665d3934716e5d3ac5737d8cf05a562f59c8b142923e3a79f1c44b55e995bd43fd0a9056a122cbe332d33947f626fa2d5bfb9f2e1824e98

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe

    Filesize

    53KB

    MD5

    052cbe208ee1678588aa7259571d2a52

    SHA1

    cb4d55542e7709b41aa803bda2cc5e50286335d1

    SHA256

    164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779

    SHA512

    732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe

    Filesize

    53KB

    MD5

    052cbe208ee1678588aa7259571d2a52

    SHA1

    cb4d55542e7709b41aa803bda2cc5e50286335d1

    SHA256

    164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779

    SHA512

    732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe

    Filesize

    53KB

    MD5

    052cbe208ee1678588aa7259571d2a52

    SHA1

    cb4d55542e7709b41aa803bda2cc5e50286335d1

    SHA256

    164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779

    SHA512

    732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe

    Filesize

    53KB

    MD5

    052cbe208ee1678588aa7259571d2a52

    SHA1

    cb4d55542e7709b41aa803bda2cc5e50286335d1

    SHA256

    164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779

    SHA512

    732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe

    Filesize

    53KB

    MD5

    052cbe208ee1678588aa7259571d2a52

    SHA1

    cb4d55542e7709b41aa803bda2cc5e50286335d1

    SHA256

    164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779

    SHA512

    732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe

    Filesize

    53KB

    MD5

    052cbe208ee1678588aa7259571d2a52

    SHA1

    cb4d55542e7709b41aa803bda2cc5e50286335d1

    SHA256

    164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779

    SHA512

    732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe

    Filesize

    53KB

    MD5

    052cbe208ee1678588aa7259571d2a52

    SHA1

    cb4d55542e7709b41aa803bda2cc5e50286335d1

    SHA256

    164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779

    SHA512

    732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe

    Filesize

    53KB

    MD5

    052cbe208ee1678588aa7259571d2a52

    SHA1

    cb4d55542e7709b41aa803bda2cc5e50286335d1

    SHA256

    164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779

    SHA512

    732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe

    Filesize

    53KB

    MD5

    052cbe208ee1678588aa7259571d2a52

    SHA1

    cb4d55542e7709b41aa803bda2cc5e50286335d1

    SHA256

    164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779

    SHA512

    732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe

    Filesize

    53KB

    MD5

    052cbe208ee1678588aa7259571d2a52

    SHA1

    cb4d55542e7709b41aa803bda2cc5e50286335d1

    SHA256

    164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779

    SHA512

    732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe

    Filesize

    53KB

    MD5

    052cbe208ee1678588aa7259571d2a52

    SHA1

    cb4d55542e7709b41aa803bda2cc5e50286335d1

    SHA256

    164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779

    SHA512

    732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27

  • memory/4072-135-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4072-164-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB