Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 12:32

General

  • Target

    ab1a6cacb7eae5eaf096001893779f0510643db961c2527f7dec2cd437984a62.exe

  • Size

    12KB

  • MD5

    b8b1b4dd5f409d1319258662bf94adf3

  • SHA1

    0cdd612fe462b25a80aac7eb849ea77af6ee0912

  • SHA256

    ab1a6cacb7eae5eaf096001893779f0510643db961c2527f7dec2cd437984a62

  • SHA512

    30960b6a7bba68d8023700c45068848f188c571e6661ca439fd6f80f2095c6974957ca07d28094dea582691445619fad235c602364d055bd9ddf6a2fe1e30c27

  • SSDEEP

    384:Xy9HKlL9ya1Yzqjpj/HTbhETWKsEX2TtW3+r:XUYL9v1s29i6KsEO

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab1a6cacb7eae5eaf096001893779f0510643db961c2527f7dec2cd437984a62.exe
    "C:\Users\Admin\AppData\Local\Temp\ab1a6cacb7eae5eaf096001893779f0510643db961c2527f7dec2cd437984a62.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_cls0.bat" "
      2⤵
        PID:2752

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_cls0.bat

      Filesize

      338B

      MD5

      910d0acd9552af6944bc6869c01418be

      SHA1

      bc5700e374391939ce7ccd20e1cf97fe17a0b4db

      SHA256

      77321bcfa1bf684c1280a5f9d3b222a51e221aa75f5f85b03aa9daefa9eac646

      SHA512

      8b35df536054fa205733235d49c12b50a0e7ca11b53019e2958fd488b258e644e472a46fcaa6f1c29a8b4f818fc068ac9944814cfbf0d907c4a87079325a9b38

    • memory/4736-132-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/4736-133-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB