Analysis

  • max time kernel
    207s
  • max time network
    237s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 20:59

General

  • Target

    022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe

  • Size

    20KB

  • MD5

    5a555e11c80d853c081f8ebd3c9c88bd

  • SHA1

    94f250a16e3aa77d982d4ad3a867e7e5437d9210

  • SHA256

    022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c

  • SHA512

    b1c63f9cb69bbdc61f9a2abb1a9f97300572a6f2189cd539e765c7b63ecb7c5f9d92aa2f62ee17d0e72755e6e187ca7c38a63d037860dd4e520543bbfa39399d

  • SSDEEP

    192:4/bROG+bO5r+C+isnpHfB7FhO8C0lzWvI4QwFt9V+jqCNa5KDJBbz:4L+q5r+PpHfXhUkKvI4QwjQNa5KDJ9

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Drops autorun.inf file 1 TTPs 25 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe
    "C:\Users\Admin\AppData\Local\Temp\022dec8de3eb60524ec45ef50404351712259118a10ca5523c916ec8832b2d1c.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Windows\AE 0124 BE.gif
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3628
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3628 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4348
    • C:\Windows\SysWOW64\drivers\winlogon.exe
      "C:\Windows\System32\drivers\winlogon.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Checks computer location settings
      • Drops autorun.inf file
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:676
      • C:\Windows\AE 0124 BE.exe
        "C:\Windows\AE 0124 BE.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4380
        • C:\Windows\SysWOW64\drivers\winlogon.exe
          "C:\Windows\System32\drivers\winlogon.exe"
          4⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:4024
      • C:\Windows\SysWOW64\drivers\winlogon.exe
        "C:\Windows\System32\drivers\winlogon.exe"
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4372

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\AE 0124 BE.exe

    Filesize

    40KB

    MD5

    de29f5ddf4a47fe6e10decd53ac2a9a6

    SHA1

    3ca47c7c7133b60a7e4e3df830a5162d002ecc97

    SHA256

    3cf1b63431b4454047f85f655279a6716be52f64c16731395bc0247eaf0e2ebb

    SHA512

    27cc3752a1edd90444954a0575950a5ba61376240efbd92effc96afb82940c805f6cf3d32db7902c8bb6d56707ae38391554c74ed419271025e99e10895ba78e

  • C:\Windows\AE 0124 BE.exe

    Filesize

    40KB

    MD5

    de29f5ddf4a47fe6e10decd53ac2a9a6

    SHA1

    3ca47c7c7133b60a7e4e3df830a5162d002ecc97

    SHA256

    3cf1b63431b4454047f85f655279a6716be52f64c16731395bc0247eaf0e2ebb

    SHA512

    27cc3752a1edd90444954a0575950a5ba61376240efbd92effc96afb82940c805f6cf3d32db7902c8bb6d56707ae38391554c74ed419271025e99e10895ba78e

  • C:\Windows\AE 0124 BE.gif

    Filesize

    20KB

    MD5

    25574d57c2719a70abcf72ebc97242df

    SHA1

    f2f993e954d992dffd7967de94843c087da4b307

    SHA256

    38b17aeee6ff6c09c9b529b936b797c422d579319413fe11cd738d00fa034532

    SHA512

    7c8c836ca2960b0e1fe7341f6300f654b85db025d3969073b98740173db57afd440af2f9b3a9b0b40b9ba74c7c4cdc9a29aaef65c5fd7747085a4f50e19ff611

  • C:\Windows\AE 0124 BE.gif

    Filesize

    40KB

    MD5

    a4c7ab6e0ab5c0b75a2257cd1d97080e

    SHA1

    b6ea0fd1a5f2fc727473bf23411e06772bcdd18c

    SHA256

    837806b6049c30f2a11e655ce6e6425c3340c2a4b128a731a9ee8a4f67126415

    SHA512

    77b5acac4bb4cd03d16634d47ffe0b8e23382aaa36de265c99ac61bd83d4c105e77072ff6e72fb77b5708d1165f6267f8b94f24133c6a2ffdbd7e86691c8378a

  • C:\Windows\Msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\Msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\drivers\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\drivers\Msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\drivers\Msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    40KB

    MD5

    de29f5ddf4a47fe6e10decd53ac2a9a6

    SHA1

    3ca47c7c7133b60a7e4e3df830a5162d002ecc97

    SHA256

    3cf1b63431b4454047f85f655279a6716be52f64c16731395bc0247eaf0e2ebb

    SHA512

    27cc3752a1edd90444954a0575950a5ba61376240efbd92effc96afb82940c805f6cf3d32db7902c8bb6d56707ae38391554c74ed419271025e99e10895ba78e

  • C:\Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    40KB

    MD5

    de29f5ddf4a47fe6e10decd53ac2a9a6

    SHA1

    3ca47c7c7133b60a7e4e3df830a5162d002ecc97

    SHA256

    3cf1b63431b4454047f85f655279a6716be52f64c16731395bc0247eaf0e2ebb

    SHA512

    27cc3752a1edd90444954a0575950a5ba61376240efbd92effc96afb82940c805f6cf3d32db7902c8bb6d56707ae38391554c74ed419271025e99e10895ba78e

  • C:\Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    40KB

    MD5

    de29f5ddf4a47fe6e10decd53ac2a9a6

    SHA1

    3ca47c7c7133b60a7e4e3df830a5162d002ecc97

    SHA256

    3cf1b63431b4454047f85f655279a6716be52f64c16731395bc0247eaf0e2ebb

    SHA512

    27cc3752a1edd90444954a0575950a5ba61376240efbd92effc96afb82940c805f6cf3d32db7902c8bb6d56707ae38391554c74ed419271025e99e10895ba78e

  • C:\Windows\SysWOW64\drivers\winlogon.exe

    Filesize

    40KB

    MD5

    de29f5ddf4a47fe6e10decd53ac2a9a6

    SHA1

    3ca47c7c7133b60a7e4e3df830a5162d002ecc97

    SHA256

    3cf1b63431b4454047f85f655279a6716be52f64c16731395bc0247eaf0e2ebb

    SHA512

    27cc3752a1edd90444954a0575950a5ba61376240efbd92effc96afb82940c805f6cf3d32db7902c8bb6d56707ae38391554c74ed419271025e99e10895ba78e

  • \??\c:\B1uv3nth3x1.diz

    Filesize

    21B

    MD5

    9cceaa243c5d161e1ce41c7dad1903dd

    SHA1

    e3da72675df53fffa781d4377d1d62116eafb35b

    SHA256

    814649b436ea43dd2abb99693e06019d4079ee74d02a0395913add0ba92d0189

    SHA512

    af9b75dc9a0b39d12d48bf6d40eb7d778eb9dd976302792271d8d4245a916027cf4e705d6cd7a5e6582ba94953346f291122f27d377b2c1a86e45f49e92efb5b

  • \??\c:\B1uv3nth3x1.diz

    Filesize

    21B

    MD5

    9cceaa243c5d161e1ce41c7dad1903dd

    SHA1

    e3da72675df53fffa781d4377d1d62116eafb35b

    SHA256

    814649b436ea43dd2abb99693e06019d4079ee74d02a0395913add0ba92d0189

    SHA512

    af9b75dc9a0b39d12d48bf6d40eb7d778eb9dd976302792271d8d4245a916027cf4e705d6cd7a5e6582ba94953346f291122f27d377b2c1a86e45f49e92efb5b