Analysis

  • max time kernel
    180s
  • max time network
    220s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 00:44

General

  • Target

    fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe

  • Size

    100KB

  • MD5

    147ce0ded445871a4a62657ddf0941e0

  • SHA1

    021ec9503d8180eb0faf192e7f88d0af9f6160ef

  • SHA256

    fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e

  • SHA512

    1e16bcc0d0920fa48b3a489f285026351659eb996b4dce2953c9051a99783098cb102fda6f9f7bdfbe667e410f7bc1e61533ffde11953bbad51a8d74f8fab802

  • SSDEEP

    3072:2RH2rkC8TSNFBucXFeBD+4jyhD88FidqaU0KO:Meu4MBTl8Fi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe
    "C:\Users\Admin\AppData\Local\Temp\fac41244efa0ce8531f225bf58355eac8bfa53a34ae556dceaf8dff982becc0e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Djj..bat" > nul 2> nul
      2⤵
        PID:3580

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Djj..bat

            Filesize

            274B

            MD5

            43af6a9ef4d8cfdb432b31aadb925fe4

            SHA1

            e815c9538cf85de6814c49edc6629b56a909d2a1

            SHA256

            844d26edd436d1e5baa12063eb02c4f93aff7a2712a0c493e042898aaef44c73

            SHA512

            0854ce97be41b70ffb08de4abcd065692163da83364db14563c035d59f97fc473b7a6bc5850bb0f9b4d6dc3a3c8501328bad34bdda04aa926203cdc090a03ca2

          • memory/4424-132-0x0000000000400000-0x000000000041C000-memory.dmp

            Filesize

            112KB

          • memory/4424-133-0x0000000000401000-0x0000000000408000-memory.dmp

            Filesize

            28KB

          • memory/4424-134-0x00000000018A0000-0x00000000018AA000-memory.dmp

            Filesize

            40KB

          • memory/4424-135-0x0000000000400000-0x000000000041C000-memory.dmp

            Filesize

            112KB

          • memory/4424-137-0x0000000000400000-0x000000000041C000-memory.dmp

            Filesize

            112KB