Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 09:40

General

  • Target

    76ae39508df323f3194b598d9344c2d0cd50682e1372f955670580754350f5b9.exe

  • Size

    2.2MB

  • MD5

    b68e67eb739a2cf86e5942a4bb258e8a

  • SHA1

    241d7255b571cd4b50dde9f384c5dc72da7c84b6

  • SHA256

    76ae39508df323f3194b598d9344c2d0cd50682e1372f955670580754350f5b9

  • SHA512

    ac98c41e4f8b7a15c3245084443f69211f359ba8d3a6aa43f3cd51320c6d6444f66499e09f898f11b5750a7846145247f59e0621084d5344de4e6942e4963f57

  • SSDEEP

    49152:3/FJJGc6WNSfNZC3qDKwwEQRqWaQspVV193fvk1GVEsLVyNXBbyNP:39OONSVZ1OIXQsAG2cSXFyNP

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76ae39508df323f3194b598d9344c2d0cd50682e1372f955670580754350f5b9.exe
    "C:\Users\Admin\AppData\Local\Temp\76ae39508df323f3194b598d9344c2d0cd50682e1372f955670580754350f5b9.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\76ae39508df323f3194b598d9344c2d0cd50682e1372f955670580754350f5b9.exe
      "C:\Users\Admin\AppData\Local\Temp\76ae39508df323f3194b598d9344c2d0cd50682e1372f955670580754350f5b9.exe" -1
      2⤵
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetWindowsHookEx
      PID:4424

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\B2101742-CEC7-4179-9D92-C656ACA7209E.dll

    Filesize

    384KB

    MD5

    e2fe027935a2ce9f0b256f33361f038d

    SHA1

    024adde42d2f4b78ce32957e6a0255f0535b6315

    SHA256

    0793fe57ccba46a0af28534b68f3c6e70f9cc0e8c4ab1f7a67ebde1ae974acd0

    SHA512

    1f3bab51fb4f6aae96b75ec3287025b927cb4f2ced7bb0d9d3ef18c54d368554ecac2742b9f6b6bb6dfa48181c8ba87a941820325fd92b6ed7b88916133d15ba

  • C:\Users\Admin\AppData\Local\Temp\B2101742-CEC7-4179-9D92-C656ACA7209E.dll

    Filesize

    384KB

    MD5

    e2fe027935a2ce9f0b256f33361f038d

    SHA1

    024adde42d2f4b78ce32957e6a0255f0535b6315

    SHA256

    0793fe57ccba46a0af28534b68f3c6e70f9cc0e8c4ab1f7a67ebde1ae974acd0

    SHA512

    1f3bab51fb4f6aae96b75ec3287025b927cb4f2ced7bb0d9d3ef18c54d368554ecac2742b9f6b6bb6dfa48181c8ba87a941820325fd92b6ed7b88916133d15ba