Analysis

  • max time kernel
    185s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 14:55

General

  • Target

    b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe

  • Size

    63KB

  • MD5

    ca7e77da33c0ef992a615c2c616b0c9c

  • SHA1

    b28dd70f9b0eab845b801726ab9895b50ac68619

  • SHA256

    b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7

  • SHA512

    bba0479ab5f7e5300fcb21a7a77a26b1879b62c4e49301bc3b50db58257e95c952ed4aea0d9e2532126cfe239e17147e02694b64519301dbc76ffa1d66985ba7

  • SSDEEP

    1536:454CnhpZeFD4zEcqPD+/2u7mbV5UdH8cQD9++N5X:45LhSD4ziy/2jvUdH8T++N5X

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe
    "C:\Users\Admin\AppData\Local\Temp\b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\SysWOW64\System64.exe
      "C:\Windows\system32\System64.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\userinit.exe
        "C:\Windows\system32\userinit.exe"
        3⤵
          PID:308

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\System64.exe

            Filesize

            63KB

            MD5

            ca7e77da33c0ef992a615c2c616b0c9c

            SHA1

            b28dd70f9b0eab845b801726ab9895b50ac68619

            SHA256

            b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7

            SHA512

            bba0479ab5f7e5300fcb21a7a77a26b1879b62c4e49301bc3b50db58257e95c952ed4aea0d9e2532126cfe239e17147e02694b64519301dbc76ffa1d66985ba7

          • C:\Windows\SysWOW64\System64.exe

            Filesize

            63KB

            MD5

            ca7e77da33c0ef992a615c2c616b0c9c

            SHA1

            b28dd70f9b0eab845b801726ab9895b50ac68619

            SHA256

            b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7

            SHA512

            bba0479ab5f7e5300fcb21a7a77a26b1879b62c4e49301bc3b50db58257e95c952ed4aea0d9e2532126cfe239e17147e02694b64519301dbc76ffa1d66985ba7

          • C:\Windows\SysWOW64\System64.exe

            Filesize

            63KB

            MD5

            ca7e77da33c0ef992a615c2c616b0c9c

            SHA1

            b28dd70f9b0eab845b801726ab9895b50ac68619

            SHA256

            b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7

            SHA512

            bba0479ab5f7e5300fcb21a7a77a26b1879b62c4e49301bc3b50db58257e95c952ed4aea0d9e2532126cfe239e17147e02694b64519301dbc76ffa1d66985ba7

          • C:\Windows\SysWOW64\System64.exe

            Filesize

            63KB

            MD5

            ca7e77da33c0ef992a615c2c616b0c9c

            SHA1

            b28dd70f9b0eab845b801726ab9895b50ac68619

            SHA256

            b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7

            SHA512

            bba0479ab5f7e5300fcb21a7a77a26b1879b62c4e49301bc3b50db58257e95c952ed4aea0d9e2532126cfe239e17147e02694b64519301dbc76ffa1d66985ba7

          • memory/2348-132-0x0000000000400000-0x000000000043B000-memory.dmp

            Filesize

            236KB

          • memory/2348-133-0x0000000000400000-0x000000000043B000-memory.dmp

            Filesize

            236KB

          • memory/2348-137-0x0000000000400000-0x000000000043B000-memory.dmp

            Filesize

            236KB

          • memory/2796-138-0x0000000000400000-0x000000000043B000-memory.dmp

            Filesize

            236KB

          • memory/2796-142-0x0000000000400000-0x000000000043B000-memory.dmp

            Filesize

            236KB