Analysis

  • max time kernel
    188s
  • max time network
    228s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 02:49

General

  • Target

    478fdd44af2e001eeac27378a975ce258a72ebf27d51334ecc7d848c0633f507.exe

  • Size

    190KB

  • MD5

    466f12226500450c245b12e80463d655

  • SHA1

    e2b546cdfff00e9bf1d2a4ab03b1f3a4bed1a160

  • SHA256

    478fdd44af2e001eeac27378a975ce258a72ebf27d51334ecc7d848c0633f507

  • SHA512

    c2af0bb2baea16f69bc7fcafee1265697e7138cf2994667b735fb96a25ebaa427305d19a2096fbd161c1d154ae1b99fde454e43178f42e59897e0b8759a457b1

  • SSDEEP

    3072:ZW0tZbSB8Bbn6aUH2pVLVAOyugTnDiKqFzqjsiuI7dJrTo:ZZBScfUULVR8n+Tcjl7d9To

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\478fdd44af2e001eeac27378a975ce258a72ebf27d51334ecc7d848c0633f507.exe
      "C:\Users\Admin\AppData\Local\Temp\478fdd44af2e001eeac27378a975ce258a72ebf27d51334ecc7d848c0633f507.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Users\Admin\AppData\Roaming\KB71742627.exe
        "C:\Users\Admin\AppData\Roaming\KB71742627.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\KB71742627.exe

    Filesize

    190KB

    MD5

    466f12226500450c245b12e80463d655

    SHA1

    e2b546cdfff00e9bf1d2a4ab03b1f3a4bed1a160

    SHA256

    478fdd44af2e001eeac27378a975ce258a72ebf27d51334ecc7d848c0633f507

    SHA512

    c2af0bb2baea16f69bc7fcafee1265697e7138cf2994667b735fb96a25ebaa427305d19a2096fbd161c1d154ae1b99fde454e43178f42e59897e0b8759a457b1

  • C:\Users\Admin\AppData\Roaming\KB71742627.exe

    Filesize

    190KB

    MD5

    466f12226500450c245b12e80463d655

    SHA1

    e2b546cdfff00e9bf1d2a4ab03b1f3a4bed1a160

    SHA256

    478fdd44af2e001eeac27378a975ce258a72ebf27d51334ecc7d848c0633f507

    SHA512

    c2af0bb2baea16f69bc7fcafee1265697e7138cf2994667b735fb96a25ebaa427305d19a2096fbd161c1d154ae1b99fde454e43178f42e59897e0b8759a457b1

  • memory/1044-150-0x0000000000560000-0x0000000000570000-memory.dmp

    Filesize

    64KB

  • memory/1044-155-0x00000000005B0000-0x00000000005C0000-memory.dmp

    Filesize

    64KB

  • memory/1044-144-0x00000000005B0000-0x00000000005C0000-memory.dmp

    Filesize

    64KB

  • memory/1044-156-0x00000000005B0000-0x00000000005C0000-memory.dmp

    Filesize

    64KB

  • memory/1044-145-0x00000000005A0000-0x00000000005B0000-memory.dmp

    Filesize

    64KB

  • memory/1044-154-0x0000000000560000-0x0000000000570000-memory.dmp

    Filesize

    64KB

  • memory/1044-140-0x0000000000570000-0x0000000000598000-memory.dmp

    Filesize

    160KB

  • memory/1044-141-0x0000000002560000-0x0000000002570000-memory.dmp

    Filesize

    64KB

  • memory/1044-142-0x00000000005A0000-0x00000000005B0000-memory.dmp

    Filesize

    64KB

  • memory/1044-143-0x00000000005B0000-0x00000000005C0000-memory.dmp

    Filesize

    64KB

  • memory/1044-157-0x00000000005B0000-0x00000000005C0000-memory.dmp

    Filesize

    64KB

  • memory/1044-153-0x00000000005B0000-0x00000000005C0000-memory.dmp

    Filesize

    64KB

  • memory/1044-148-0x00000000005B0000-0x00000000005C0000-memory.dmp

    Filesize

    64KB

  • memory/1044-147-0x00000000005B0000-0x00000000005C0000-memory.dmp

    Filesize

    64KB

  • memory/1044-146-0x00000000005B0000-0x00000000005C0000-memory.dmp

    Filesize

    64KB

  • memory/1044-149-0x0000000002560000-0x0000000002570000-memory.dmp

    Filesize

    64KB

  • memory/1044-152-0x00000000005B0000-0x00000000005C0000-memory.dmp

    Filesize

    64KB

  • memory/1044-151-0x00000000005B0000-0x00000000005C0000-memory.dmp

    Filesize

    64KB

  • memory/1576-134-0x0000000000000000-mapping.dmp

  • memory/1576-139-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1576-138-0x0000000002060000-0x0000000002077000-memory.dmp

    Filesize

    92KB

  • memory/3616-132-0x0000000002060000-0x0000000002077000-memory.dmp

    Filesize

    92KB

  • memory/3616-133-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3616-136-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB