Analysis

  • max time kernel
    134s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 08:45

General

  • Target

    baf40ef47649293a383d12b7b6ccc27b893ac757ffc816cbd54784a9819b09f2.exe

  • Size

    222KB

  • MD5

    9f84c9ecd51b4c80d90ae34d93f60993

  • SHA1

    6f38a9ab31298873ad5befb16cee186d7545d55a

  • SHA256

    baf40ef47649293a383d12b7b6ccc27b893ac757ffc816cbd54784a9819b09f2

  • SHA512

    363af8489b9dde4ea7d38659d646201129e3a7bb40053b5200ea17902f46e3509d0f0cce8fff4d51ec422f94bd896fcadea84265d3b5dbeeb3d48205813f8daf

  • SSDEEP

    6144:8d93ZBZMbqYgomHmXWValAHcv5NNyhTQrfWonYVhNlYX:8r3ZBIRi4G8v5NgcfWGX

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\baf40ef47649293a383d12b7b6ccc27b893ac757ffc816cbd54784a9819b09f2.exe
    "C:\Users\Admin\AppData\Local\Temp\baf40ef47649293a383d12b7b6ccc27b893ac757ffc816cbd54784a9819b09f2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4576
    • C:\Users\Admin\AppData\Local\Temp\15.exe
      "C:\Users\Admin\AppData\Local\Temp\15.exe"
      2⤵
      • Executes dropped EXE
      PID:2588
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 224
        3⤵
        • Program crash
        PID:4864
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2588 -ip 2588
    1⤵
      PID:4336

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\15.exe

      Filesize

      126KB

      MD5

      264bb9edac9b7f166c7aa8ebb9238ebf

      SHA1

      0121c1912a4ab05b08a7f43b8430276bb0798363

      SHA256

      f5acdb0603469661bd48d715906dd8c0f026d1c125df55e4699d4cc886f20f8a

      SHA512

      f19c5c4c5ac153806f60e046972a2c6079d872220f16679f20671c9f4716d7698d239db80a3c79ce929ae5ded9de92c2ef30b76d97a38dc0b44b026447c1a0a4

    • C:\Users\Admin\AppData\Local\Temp\15.exe

      Filesize

      126KB

      MD5

      264bb9edac9b7f166c7aa8ebb9238ebf

      SHA1

      0121c1912a4ab05b08a7f43b8430276bb0798363

      SHA256

      f5acdb0603469661bd48d715906dd8c0f026d1c125df55e4699d4cc886f20f8a

      SHA512

      f19c5c4c5ac153806f60e046972a2c6079d872220f16679f20671c9f4716d7698d239db80a3c79ce929ae5ded9de92c2ef30b76d97a38dc0b44b026447c1a0a4

    • memory/2588-135-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB