Analysis

  • max time kernel
    274s
  • max time network
    359s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 15:37

General

  • Target

    49363f08a18524030e6c1ab7d036d251ec00624567f3c1a34599ec31760ea6e7.exe

  • Size

    1.9MB

  • MD5

    2f50f0523060c46809128782cce3a38e

  • SHA1

    0f0ce0288098d465123c8749ac51acce8dbf054f

  • SHA256

    49363f08a18524030e6c1ab7d036d251ec00624567f3c1a34599ec31760ea6e7

  • SHA512

    fafdaa82a9f30c23d616b66f50df6f23a6a5d7fb242016bb606190ec5bd55f40bc4713f7d17b73c4ce5bac4d6152058b9af73d890be5f77c41e05c9ce9bc086c

  • SSDEEP

    49152:NsP/n+AVOIlKSX5iZmyklvHH8R8nqTfw7T2/bD4LWnhy3s03d98:u+GwUWm3RSia/P4LWhy3sMi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49363f08a18524030e6c1ab7d036d251ec00624567f3c1a34599ec31760ea6e7.exe
    "C:\Users\Admin\AppData\Local\Temp\49363f08a18524030e6c1ab7d036d251ec00624567f3c1a34599ec31760ea6e7.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\MT5L8IfO.Cpl",
      2⤵
        PID:3752

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3752-132-0x0000000000000000-mapping.dmp