Analysis

  • max time kernel
    154s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 13:25

General

  • Target

    b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5.exe

  • Size

    79KB

  • MD5

    d1d12eed486f943fb15ea04da63be9e9

  • SHA1

    b6b365a0f04bddeabe2cdb0879c76e972602f933

  • SHA256

    b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5

  • SHA512

    db7aae4cbe3b70c9e397b6b909f34e65bc58425d0dacc6264481155d48337329eaeebafc5df8b139ff5d4a1b0608b97f3236158bebb34f94af159588b31b771d

  • SSDEEP

    1536:hKoYJ/VnGgXqkwk885iXMmX5zGpY8A24xk6p:MoyVGZD8IMm6J4xk

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5.exe
    "C:\Users\Admin\AppData\Local\Temp\b577f7aa19e0d720515e2e187c229975dbda637689ef9d30f3c94281473672e5.exe"
    1⤵
    • Checks computer location settings
    • Enumerates system info in registry
    • Suspicious use of WriteProcessMemory
    PID:4412
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Tqz..bat" > nul 2> nul
      2⤵
        PID:396

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Tqz..bat

      Filesize

      274B

      MD5

      6f2a6a52f6d482410094a735671b8a58

      SHA1

      526cb15ee7f6b090d8869e1c3d02894cb0a34c27

      SHA256

      3d6f823f45099fd4b6c1aabe6c2c6de02c6dd35f18b449d6590d1e36d8c756b0

      SHA512

      602736a7f1db164651e6ac2ee9ffe436814a6d9bc71de2ca349d2bfff781406671ba713581d9cf9838561b2a2ce592c9175a5e907e0d71f16c0d25a0dffe7a9e

    • memory/4412-132-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/4412-134-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB