Analysis

  • max time kernel
    147s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 04:30

General

  • Target

    60e10543cd0be245209a8f3da1517790c5c0a1613b10b4145adc438e8f5ee47f.exe

  • Size

    50KB

  • MD5

    d4791e6cbb9dff8dd92fbb3b1a42dda2

  • SHA1

    7c3b0cba3a6a30bbe7baf399d76531a202146c05

  • SHA256

    60e10543cd0be245209a8f3da1517790c5c0a1613b10b4145adc438e8f5ee47f

  • SHA512

    ff0a6980a2f051df4c062692bf8839a8f8cbcd39ee598e50f121b0e6ec6e2fe60e7c4041a080bc578dc4630ca0d0a79cbd5da34977afd50de20c8bca35f3fa91

  • SSDEEP

    768:V1QM9CFilbA7Oc5fpVZRYMMDHjvEX2nT+ipe8tDWU/LR2NBZpmjEJ+l8:xWi5AzfXYMMHY2nT+ipeYv2ND4x8

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60e10543cd0be245209a8f3da1517790c5c0a1613b10b4145adc438e8f5ee47f.exe
    "C:\Users\Admin\AppData\Local\Temp\60e10543cd0be245209a8f3da1517790c5c0a1613b10b4145adc438e8f5ee47f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Users\Admin\AppData\Local\Temp\60e10543cd0be245209a8f3da1517790c5c0a1613b10b4145adc438e8f5ee47f.exe
      "C:\Users\Admin\AppData\Local\Temp\60e10543cd0be245209a8f3da1517790c5c0a1613b10b4145adc438e8f5ee47f.exe"
      2⤵
        PID:4564
      • C:\Users\Admin\AppData\Local\Temp\60e10543cd0be245209a8f3da1517790c5c0a1613b10b4145adc438e8f5ee47f.exe
        "C:\Users\Admin\AppData\Local\Temp\60e10543cd0be245209a8f3da1517790c5c0a1613b10b4145adc438e8f5ee47f.exe"
        2⤵
        • Executes dropped EXE
        • Maps connected drives based on registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\syswow64\svchost.exe
          3⤵
          • Adds policy Run key to start application
          • Drops file in Program Files directory
          PID:2288

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\60e10543cd0be245209a8f3da1517790c5c0a1613b10b4145adc438e8f5ee47f.exe

      Filesize

      50KB

      MD5

      d4791e6cbb9dff8dd92fbb3b1a42dda2

      SHA1

      7c3b0cba3a6a30bbe7baf399d76531a202146c05

      SHA256

      60e10543cd0be245209a8f3da1517790c5c0a1613b10b4145adc438e8f5ee47f

      SHA512

      ff0a6980a2f051df4c062692bf8839a8f8cbcd39ee598e50f121b0e6ec6e2fe60e7c4041a080bc578dc4630ca0d0a79cbd5da34977afd50de20c8bca35f3fa91

    • memory/2288-138-0x0000000000790000-0x000000000079E000-memory.dmp

      Filesize

      56KB

    • memory/2288-139-0x00000000005B0000-0x00000000005B5000-memory.dmp

      Filesize

      20KB

    • memory/2288-140-0x00000000004D0000-0x00000000004D5000-memory.dmp

      Filesize

      20KB

    • memory/2288-141-0x00000000004D0000-0x00000000004D5000-memory.dmp

      Filesize

      20KB

    • memory/2880-134-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2880-137-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB