Analysis

  • max time kernel
    148s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 06:34

General

  • Target

    ee1e2823184ac4e3549f8774db700170ea763a2fde7ddcb4379837ed2487463a.exe

  • Size

    2.1MB

  • MD5

    ab59ba909a34ec973045dcad6e867276

  • SHA1

    dd538f5e0847a245a6b3256983aa3cf2677b137e

  • SHA256

    ee1e2823184ac4e3549f8774db700170ea763a2fde7ddcb4379837ed2487463a

  • SHA512

    3206967d91933ef2b693df5d74c656162db2aeda139e32809743be39f94f52c5c4407a7f911b4df31c327059ef905cb811e3ad8ed62aea183acd71ab805f42ae

  • SSDEEP

    24576:hfAqOavfPNman8jarwLeXfB0yfM8GUS/heII8oyn6yKXbs1x3/rcpBpnuq9zq4Mq:hua82rNJKU0n8Xg1V/yrBXP

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee1e2823184ac4e3549f8774db700170ea763a2fde7ddcb4379837ed2487463a.exe
    "C:\Users\Admin\AppData\Local\Temp\ee1e2823184ac4e3549f8774db700170ea763a2fde7ddcb4379837ed2487463a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /im serviceupda.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im serviceupda.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:5060
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /im flashplayer.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im flashplayer.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3840
    • C:\Users\Admin\AppData\Local\Temp\flashplayer.exe
      "C:\Users\Admin\AppData\Local\Temp\flashplayer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:540
    • C:\Users\Admin\AppData\Local\Temp\serviceupda.exe
      "C:\Users\Admin\AppData\Local\Temp\serviceupda.exe"
      2⤵
      • Executes dropped EXE
      PID:2456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\flashplayer.exe

    Filesize

    1.1MB

    MD5

    96c436d7e2b49f213a983cb3e648b04d

    SHA1

    84ad2263701b370caa15ec6142fa81b2db3342c2

    SHA256

    22225caeedc7e46ccc98af1c6622c626f4d75a93b6a9976a2eed11b429e59188

    SHA512

    095b62d0288a8be544a989f3949b7afe5415475e8acb379bfc9b31d74a0cecdee81433a84496853edc155cd96df9fe1c3524beaf3decc95b343aafc29ae6c8d8

  • C:\Users\Admin\AppData\Local\Temp\flashplayer.exe

    Filesize

    1.1MB

    MD5

    96c436d7e2b49f213a983cb3e648b04d

    SHA1

    84ad2263701b370caa15ec6142fa81b2db3342c2

    SHA256

    22225caeedc7e46ccc98af1c6622c626f4d75a93b6a9976a2eed11b429e59188

    SHA512

    095b62d0288a8be544a989f3949b7afe5415475e8acb379bfc9b31d74a0cecdee81433a84496853edc155cd96df9fe1c3524beaf3decc95b343aafc29ae6c8d8

  • C:\Users\Admin\AppData\Local\Temp\serviceupda.exe

    Filesize

    360KB

    MD5

    a6719ac8e069f3aa4abe2a087a3dd317

    SHA1

    cffd1a8252f418d6d5c8ea3fc36295ca1dd4edcb

    SHA256

    ec187fa1b5e8322ee8f0638c5bc8def4d231b2525d5ec47bf6ba5112b31e8866

    SHA512

    30bfcd2956090505232817b620a78264576bd6208713cd8cdf645e873bf115ffb6e3fe1df8d31fbe5b54ef7e0d8dec485d621671026bb9d93c9d9589773c10db

  • C:\Users\Admin\AppData\Local\Temp\serviceupda.exe

    Filesize

    360KB

    MD5

    a6719ac8e069f3aa4abe2a087a3dd317

    SHA1

    cffd1a8252f418d6d5c8ea3fc36295ca1dd4edcb

    SHA256

    ec187fa1b5e8322ee8f0638c5bc8def4d231b2525d5ec47bf6ba5112b31e8866

    SHA512

    30bfcd2956090505232817b620a78264576bd6208713cd8cdf645e873bf115ffb6e3fe1df8d31fbe5b54ef7e0d8dec485d621671026bb9d93c9d9589773c10db

  • memory/540-139-0x0000000000D50000-0x000000000116C000-memory.dmp

    Filesize

    4.1MB

  • memory/540-143-0x0000000000D40000-0x0000000000D43000-memory.dmp

    Filesize

    12KB

  • memory/540-144-0x0000000000D50000-0x000000000116C000-memory.dmp

    Filesize

    4.1MB