Analysis

  • max time kernel
    156s
  • max time network
    215s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 17:19

General

  • Target

    cfc4c1186692634e9b8b040513b7316d717cc52bea03708e8997400bd94b613f.exe

  • Size

    204KB

  • MD5

    d1da4871924d59fe6667f5c753eb91d6

  • SHA1

    e9f4ce044b5c38c43e6a023b8ec93dda482046be

  • SHA256

    cfc4c1186692634e9b8b040513b7316d717cc52bea03708e8997400bd94b613f

  • SHA512

    a7bf767177715880308a08318b55fbbcf51b37b507098a2d36c4d173234900399359db4a1877a803ce879282253a4cc61df8f54476aca7ad9ecb1d44efe39b85

  • SSDEEP

    1536:s6KF7Mz2YP3hLOcsckFV72zwlLsJX0Cgf819pQOgICvZGIHaCp1uXnHATsg/csEn:t53lHkSwlLba9p92vIFHADH1+ML7ny

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 39 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfc4c1186692634e9b8b040513b7316d717cc52bea03708e8997400bd94b613f.exe
    "C:\Users\Admin\AppData\Local\Temp\cfc4c1186692634e9b8b040513b7316d717cc52bea03708e8997400bd94b613f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\cfc4c1186692634e9b8b040513b7316d717cc52bea03708e8997400bd94b613f
      2⤵
        PID:3900
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c C:\Users\Admin\AppData\Local\Temp\12611.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3608
        • C:\Users\Admin\AppData\Local\Temp\12611.exe
          C:\Users\Admin\AppData\Local\Temp\12611.exe
          3⤵
          • Executes dropped EXE
          PID:4504
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\CFC4C1~1.EXE > nul
        2⤵
          PID:4308
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3164
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:664

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\12611.exe

          Filesize

          14KB

          MD5

          90a241b997af67de416c736f04862248

          SHA1

          e42e4a9612f50dd4e29d5cb9faf6b0a56691f7cb

          SHA256

          fccfd9a13f2710e9677fe43816607425e80feb28e3573c55c27906fc7a68eefe

          SHA512

          e6ec07cbb809bfcbb3a4b98bc58613d42e8b667f15a2a2cbabf1badf31a40e4fae2c81b2cf7278bc49e7bb16d6b7f05e8373be0b3c0aa6de748364bbacc094d1

        • C:\Users\Admin\AppData\Local\Temp\12611.exe

          Filesize

          14KB

          MD5

          90a241b997af67de416c736f04862248

          SHA1

          e42e4a9612f50dd4e29d5cb9faf6b0a56691f7cb

          SHA256

          fccfd9a13f2710e9677fe43816607425e80feb28e3573c55c27906fc7a68eefe

          SHA512

          e6ec07cbb809bfcbb3a4b98bc58613d42e8b667f15a2a2cbabf1badf31a40e4fae2c81b2cf7278bc49e7bb16d6b7f05e8373be0b3c0aa6de748364bbacc094d1

        • C:\Users\Admin\AppData\Local\Temp\cfc4c1186692634e9b8b040513b7316d717cc52bea03708e8997400bd94b613f\yqh.JPG

          Filesize

          88KB

          MD5

          8de5d13881c86110bde78f486ce110e1

          SHA1

          6ef18101e902859cb481b7fe2229bdf329e4e704

          SHA256

          8783ac5941fd594a9f34907d3353d2bbcff2585fca4d09c39df40b7c1ab0b91e

          SHA512

          0dfa09a4c7179a2a32ae5c60820f043a3895e2a4a87c3fa2f627213ddadf7093781c8db702ddbfd127f3b5072abbf33a1b03f85bf847712378af5982410308f6