Analysis

  • max time kernel
    152s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 00:15

General

  • Target

    e77948b5a238251a8765acbc392671014fe7298dd177db8262a10c4f4deb5f6f.exe

  • Size

    102KB

  • MD5

    1d9e7bdde571ebc3642892e71ac1ade5

  • SHA1

    f4f0cb78e1c2c5acf88c1cd51f617c13bc3c0708

  • SHA256

    e77948b5a238251a8765acbc392671014fe7298dd177db8262a10c4f4deb5f6f

  • SHA512

    c81e5e4a7aa0e7c6d6303852332e10c17e2ac476bb5d4cedbeda71aba2b2b556fa58e4ed5c94b997bcb56e045c21241384a4fe1becbcbf2f6ffd4e180cdf4de8

  • SSDEEP

    3072:nbLpZuEskJoU4gURKKaacfslyhE03imZ755aL:nbOOJYKKa1fZ5aL

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Unexpected DNS network traffic destination 38 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 5 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e77948b5a238251a8765acbc392671014fe7298dd177db8262a10c4f4deb5f6f.exe
    "C:\Users\Admin\AppData\Local\Temp\e77948b5a238251a8765acbc392671014fe7298dd177db8262a10c4f4deb5f6f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Users\Admin\AppData\Local\Temp\pdyq.exe
      pdyq.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Modifies Control Panel
      • Suspicious use of WriteProcessMemory
      PID:3728
      • C:\Windows\SysWOW64\ipconfig.exe
        "C:\Windows\System32\ipconfig.exe" /flushdns
        3⤵
        • Gathers network information
        PID:1756
      • C:\Windows\SysWOW64\ipconfig.exe
        "C:\Windows\System32\ipconfig.exe" /registerdns
        3⤵
        • Gathers network information
        PID:2520
      • C:\Windows\SysWOW64\ipconfig.exe
        "C:\Windows\System32\ipconfig.exe" /dnsflush
        3⤵
        • Gathers network information
        PID:3440
      • C:\Windows\SysWOW64\ipconfig.exe
        "C:\Windows\System32\ipconfig.exe" /renew
        3⤵
        • Gathers network information
        PID:4260
      • C:\Windows\SysWOW64\ipconfig.exe
        "C:\Windows\System32\ipconfig.exe" /renew_all
        3⤵
        • Gathers network information
        PID:3368
    • C:\Users\Admin\AppData\Local\Temp\mdqj.exe
      mdqj.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Modifies WinLogon
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3592
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        3⤵
        • Modifies registry class
        PID:3444

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\mdqj.exe

          Filesize

          61KB

          MD5

          9f51eddb63268d85a3b58847c215b499

          SHA1

          af969a5d5bbea308a371b69ce0b0a4c632049c91

          SHA256

          8789a1c1c255840701010e7675e38b434a24e4c3af35b91bf1f0410feb7be7cd

          SHA512

          56fac48804dce4f4cc857b64a6117bd597a50c78984a6eb8fdd71b9aeace5ea1da621ee1741e1b1118ae6b4112945f28443d2b5b22605900976c115bbbcf31cb

        • C:\Users\Admin\AppData\Local\Temp\mdqj.exe

          Filesize

          61KB

          MD5

          9f51eddb63268d85a3b58847c215b499

          SHA1

          af969a5d5bbea308a371b69ce0b0a4c632049c91

          SHA256

          8789a1c1c255840701010e7675e38b434a24e4c3af35b91bf1f0410feb7be7cd

          SHA512

          56fac48804dce4f4cc857b64a6117bd597a50c78984a6eb8fdd71b9aeace5ea1da621ee1741e1b1118ae6b4112945f28443d2b5b22605900976c115bbbcf31cb

        • C:\Users\Admin\AppData\Local\Temp\pdyq.exe

          Filesize

          7KB

          MD5

          0663a67123bef8c4d90b3cca02718680

          SHA1

          2442051db230aa23dbe9b624eea18d86da466299

          SHA256

          0bab5c1c29c68bcb378079724a6848fb176affdc2b540d52f9c903f294d47343

          SHA512

          061ceeb21a772d38ab09a0692e226f4365fece0c50e0732824f312072fef4fdd3a1fb866b772f1d6cc9f7696f72b1e378af9481adaa97b60a99e5fe8b66857a2

        • C:\Users\Admin\AppData\Local\Temp\pdyq.exe

          Filesize

          7KB

          MD5

          0663a67123bef8c4d90b3cca02718680

          SHA1

          2442051db230aa23dbe9b624eea18d86da466299

          SHA256

          0bab5c1c29c68bcb378079724a6848fb176affdc2b540d52f9c903f294d47343

          SHA512

          061ceeb21a772d38ab09a0692e226f4365fece0c50e0732824f312072fef4fdd3a1fb866b772f1d6cc9f7696f72b1e378af9481adaa97b60a99e5fe8b66857a2

        • memory/3592-139-0x000000006B800000-0x000000006B8F0000-memory.dmp

          Filesize

          960KB

        • memory/3592-151-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/3592-153-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/3728-135-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB