Analysis

  • max time kernel
    175s
  • max time network
    231s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 07:17

General

  • Target

    995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56.exe

  • Size

    67KB

  • MD5

    7c40425452502a673ec1055c35f08a9b

  • SHA1

    d4b63bc3425fe8fefbd4a6cd36e5c12b7de40c39

  • SHA256

    995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56

  • SHA512

    bd98a9058b6b8ed839005b09e1e8379ecc669d50241545091ac67d49f13591ba29862bbbd5e85b108241d7db0af6e6308e5bbdee8cb4b6303c620b862e95220c

  • SSDEEP

    1536:2wetP10SuUdZuhRfUwvw37j/XrTnEmgIFlkFVtJ/q:2vc0ZupIrj/XzD4d/q

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56.exe
    "C:\Users\Admin\AppData\Local\Temp\995a7d58de539192ed73b56a0ef9d7a4754254c1c2cc12997bce1ef4b29b2f56.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Qvb..bat" > nul 2> nul
      2⤵
        PID:228

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Qvb..bat

      Filesize

      274B

      MD5

      8f613a5465230f2e53ffab0fcfc4e378

      SHA1

      acc32618d9ac57186ba37bd969f5ae408bc3cee2

      SHA256

      2ffe99aed8dd93f9d1e10dab71ecfb32752b1e897e273b9df01c7cf7525cceb8

      SHA512

      22eab77710a5e638c02d0cdf16c6747bedfe05f6c977d3f6c15c26b9322bc5c428bd1c7e8b30977193f6d370172dcdfc2c05240056d57078cb20426a83881dbc

    • memory/228-135-0x0000000000000000-mapping.dmp

    • memory/2360-132-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2360-133-0x00000000004A0000-0x00000000004B2000-memory.dmp

      Filesize

      72KB

    • memory/2360-134-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2360-136-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB