Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 17:16

General

  • Target

    d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe

  • Size

    1.1MB

  • MD5

    5e1c2e6f9198085ba91feadb94f1b368

  • SHA1

    354423c09e50fd8cbafedd104dd90efd6a52b691

  • SHA256

    d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a

  • SHA512

    df7b712fe79f9d6b58b11515830a8e72891fd9db9cd51e9e1f53515be5d48382f45d39467150f2601a03891d176b4e5009c1fa276be4ef749799294d9e7008b7

  • SSDEEP

    12288:EX87M0uZr2qmQ4FkK88BibQmGC5cYibZUMt99zfMmlrh1RV+apUItSvrpSVC9MoS:ED2qmQ4FzBvvC5cY0t9fDrhtCMMOHEjS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe
    "C:\Users\Admin\AppData\Local\Temp\d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4920
      • C:\Users\Admin\AppData\Local\Temp\myrogclua.exe
        -g yes -o http://Ya4LPJ:[email protected]:80
        3⤵
        • Executes dropped EXE
        PID:1384
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\hilgX.vbs"
      2⤵
        PID:368

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\hilgX.vbs

            Filesize

            398B

            MD5

            058c53333b53cc4eec0493f7e2c37531

            SHA1

            8e9033908347f1d51361c93abbb9d57e4c07c0b3

            SHA256

            f0ced39e2aaeaf1e67da2202918947038f8822179bce145d2cb1df1cdc137b50

            SHA512

            07dcea6880db47f0a91f37544bb923953391bcfdb1c5ead17f0690275b70a46ff963406ae3129c33e5c79c559d5ecc7deb8e502425c3c98ab8a597bbc8a424b4

          • C:\Users\Admin\AppData\Local\Temp\myrogclua.exe

            Filesize

            988KB

            MD5

            f7f27a4ba13238e87f13d68955a11954

            SHA1

            1ae7730667a5cf21ade307e2c52eca5f25730a42

            SHA256

            db135ee55ddd17d285b641d45c25051e1fa428fcf77b5aeaccbc9c979a2e7d50

            SHA512

            48521d8c810a64f4658615ea92e14f98f552536ea443c21c8c4d3adc0efdf117d3a678ce402bf4425da1e96aeecc0e3f3f534b7a653b47e532a73b29b3a8293d

          • C:\Users\Admin\AppData\Local\Temp\myrogclua.exe

            Filesize

            988KB

            MD5

            f7f27a4ba13238e87f13d68955a11954

            SHA1

            1ae7730667a5cf21ade307e2c52eca5f25730a42

            SHA256

            db135ee55ddd17d285b641d45c25051e1fa428fcf77b5aeaccbc9c979a2e7d50

            SHA512

            48521d8c810a64f4658615ea92e14f98f552536ea443c21c8c4d3adc0efdf117d3a678ce402bf4425da1e96aeecc0e3f3f534b7a653b47e532a73b29b3a8293d

          • memory/4804-132-0x00000000747E0000-0x0000000074D91000-memory.dmp

            Filesize

            5.7MB

          • memory/4804-141-0x00000000747E0000-0x0000000074D91000-memory.dmp

            Filesize

            5.7MB

          • memory/4920-134-0x0000000000400000-0x0000000000502000-memory.dmp

            Filesize

            1.0MB

          • memory/4920-136-0x0000000000400000-0x0000000000502000-memory.dmp

            Filesize

            1.0MB