Analysis

  • max time kernel
    143s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 03:13

General

  • Target

    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe

  • Size

    152KB

  • MD5

    f432a89d4ba2e6aa2975335f3a57da1b

  • SHA1

    815689ebd707d7e55fd35815958db05c923b590c

  • SHA256

    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a

  • SHA512

    c7dba55980d6a3ee5871ec9a50227f7e92e8f2bd4a74d25d15ae76f0110f437ac215fe3ec25921b6f2b0167ca044d5a35835477756c2dae86344b32844a81905

  • SSDEEP

    3072:yIl0QiGEomaClFmwbcDRMjEBZ4v9xDx71yHVJA/ndH5:uJG2rv3cGBvHV7Wknd

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    "C:\Users\Admin\AppData\Local\Temp\7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Windows\SysWOW64\regedt32.exe
      "C:\Windows\System32\regedt32.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\regedit.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"
        3⤵
        • Runs .reg file with regedit
        PID:3436
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 1012
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:2288
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 984
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:2356
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 5036 -ip 5036
    1⤵
    • Loads dropped DLL
    PID:5048
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 5036 -ip 5036
    1⤵
    • Loads dropped DLL
    PID:2324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\Iterra\T03emp03.reg

    Filesize

    217B

    MD5

    d8841f7d471efa7e3b960da51ece135f

    SHA1

    4b128b589f7f49df4585177d2d2a37356241a0d3

    SHA256

    d411b8fce61ef781402f1e177d3ddef3ba10e9fe7d5b29c0d7f33948ac8655be

    SHA512

    25005451f606d92005baa5604bbced7ee068ea337ba41b3c3bb85fbe6ced6d80becc2ebaa8abfd9012a36d5b00cfc4dd5b89dd10318beaa21a9ea312f4035d56

  • C:\Users\Admin\Documents\Iterra\awwgdlk.dll

    Filesize

    41KB

    MD5

    3fd996d73950eeb6edfa0a2f6589fd89

    SHA1

    3c998a95ff61cf2054c0b155d2a09cf7002d1779

    SHA256

    18a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb

    SHA512

    9e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1

  • C:\Users\Admin\Documents\Iterra\awwgdlk.dll

    Filesize

    41KB

    MD5

    3fd996d73950eeb6edfa0a2f6589fd89

    SHA1

    3c998a95ff61cf2054c0b155d2a09cf7002d1779

    SHA256

    18a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb

    SHA512

    9e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1

  • C:\Users\Admin\Documents\Iterra\awwgdlk.dll

    Filesize

    41KB

    MD5

    3fd996d73950eeb6edfa0a2f6589fd89

    SHA1

    3c998a95ff61cf2054c0b155d2a09cf7002d1779

    SHA256

    18a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb

    SHA512

    9e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1

  • C:\Users\Admin\Documents\Iterra\awwgdlk.dll

    Filesize

    41KB

    MD5

    3fd996d73950eeb6edfa0a2f6589fd89

    SHA1

    3c998a95ff61cf2054c0b155d2a09cf7002d1779

    SHA256

    18a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb

    SHA512

    9e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1

  • C:\Users\Admin\Documents\Iterra\awwgdlk.dll

    Filesize

    41KB

    MD5

    3fd996d73950eeb6edfa0a2f6589fd89

    SHA1

    3c998a95ff61cf2054c0b155d2a09cf7002d1779

    SHA256

    18a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb

    SHA512

    9e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1

  • memory/5036-134-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/5036-139-0x0000000003110000-0x00000000031E3000-memory.dmp

    Filesize

    844KB

  • memory/5036-133-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/5036-132-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/5036-144-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB