Analysis

  • max time kernel
    152s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 04:51

General

  • Target

    cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe

  • Size

    118KB

  • MD5

    9b9c8b0d1b9bbef53fb5475c613bb7b1

  • SHA1

    626754baf14fdf30f8120e0ebf4016b2158d7db3

  • SHA256

    cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6

  • SHA512

    c3944e33c236537885e2efe8e4accd2d9ab49bc8fbaa8d31a9330dec3a6bd048135ce56c22bcd18e086919eea1faf27f88d36d23f59341c6911b24079131408f

  • SSDEEP

    3072:onHWeIYYD6ZzTTJP9tXWXyV3ARxrCMMQXRZeI:62iYDSjJbX9ArCqh/

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe
    "C:\Users\Admin\AppData\Local\Temp\cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Users\Admin\AppData\Local\Temp\cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe
      C:\Users\Admin\AppData\Local\Temp\cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe
      2⤵
        PID:4912
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\audiadg.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\audiadg.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1848
        • C:\Users\Admin\AppData\Local\Temp\bcdprov.exe
          "C:\Users\Admin\AppData\Local\Temp\bcdprov.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1748
          • C:\Users\Admin\AppData\Local\Temp\bcdprov.exe
            C:\Users\Admin\AppData\Local\Temp\bcdprov.exe
            4⤵
            • Executes dropped EXE
            PID:1568

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bcdprov.exe

      Filesize

      118KB

      MD5

      9b9c8b0d1b9bbef53fb5475c613bb7b1

      SHA1

      626754baf14fdf30f8120e0ebf4016b2158d7db3

      SHA256

      cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6

      SHA512

      c3944e33c236537885e2efe8e4accd2d9ab49bc8fbaa8d31a9330dec3a6bd048135ce56c22bcd18e086919eea1faf27f88d36d23f59341c6911b24079131408f

    • C:\Users\Admin\AppData\Local\Temp\bcdprov.exe

      Filesize

      118KB

      MD5

      9b9c8b0d1b9bbef53fb5475c613bb7b1

      SHA1

      626754baf14fdf30f8120e0ebf4016b2158d7db3

      SHA256

      cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6

      SHA512

      c3944e33c236537885e2efe8e4accd2d9ab49bc8fbaa8d31a9330dec3a6bd048135ce56c22bcd18e086919eea1faf27f88d36d23f59341c6911b24079131408f

    • C:\Users\Admin\AppData\Local\Temp\bcdprov.exe

      Filesize

      118KB

      MD5

      9b9c8b0d1b9bbef53fb5475c613bb7b1

      SHA1

      626754baf14fdf30f8120e0ebf4016b2158d7db3

      SHA256

      cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6

      SHA512

      c3944e33c236537885e2efe8e4accd2d9ab49bc8fbaa8d31a9330dec3a6bd048135ce56c22bcd18e086919eea1faf27f88d36d23f59341c6911b24079131408f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\audiadg.exe

      Filesize

      10KB

      MD5

      7102425f9bbdb8243ec761ba7d74df60

      SHA1

      23515f564d8a86abb17375b1e354071d88b952a5

      SHA256

      e701435d4adb4b5929c1f6d06a390cfc9d2199e657f9b5cfbc2517fc257e85d3

      SHA512

      9f0176b4713ed6d4934dbf1e52ce6e151357c3962f2c960a17e6c6a856a12672a731d108bfaa0301d3c5b62f7e92d3909bc301b99b9b8f9cb5457e53e7851b0b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\audiadg.exe

      Filesize

      10KB

      MD5

      7102425f9bbdb8243ec761ba7d74df60

      SHA1

      23515f564d8a86abb17375b1e354071d88b952a5

      SHA256

      e701435d4adb4b5929c1f6d06a390cfc9d2199e657f9b5cfbc2517fc257e85d3

      SHA512

      9f0176b4713ed6d4934dbf1e52ce6e151357c3962f2c960a17e6c6a856a12672a731d108bfaa0301d3c5b62f7e92d3909bc301b99b9b8f9cb5457e53e7851b0b

    • memory/1748-152-0x0000000074E90000-0x0000000075441000-memory.dmp

      Filesize

      5.7MB

    • memory/1748-150-0x0000000074E90000-0x0000000075441000-memory.dmp

      Filesize

      5.7MB

    • memory/1848-151-0x0000000074E90000-0x0000000075441000-memory.dmp

      Filesize

      5.7MB

    • memory/1848-141-0x0000000074E90000-0x0000000075441000-memory.dmp

      Filesize

      5.7MB

    • memory/2448-132-0x0000000074E90000-0x0000000075441000-memory.dmp

      Filesize

      5.7MB

    • memory/2448-137-0x0000000074E90000-0x0000000075441000-memory.dmp

      Filesize

      5.7MB

    • memory/4912-134-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/4912-135-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/4912-136-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB