Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 18:15

General

  • Target

    461f80a7835f6660005e184ceae6df4fa24807836ea4c355182e312131c326c5.exe

  • Size

    2.6MB

  • MD5

    8547c878787692870f6cb73ac772c4e6

  • SHA1

    ae44b0581d5c3bee317873cbf0e23044d45eac62

  • SHA256

    461f80a7835f6660005e184ceae6df4fa24807836ea4c355182e312131c326c5

  • SHA512

    3c0528e914aa2c54bc2dc1f6c9ad71e10eb18c228be8ac77eabbfb71beaf277f4df8582fa491ab53631c20d220b644054646a2a8cc18073c2c5aea293617dd86

  • SSDEEP

    49152:G+pw97HhY6Hk009aeWyGitBdxPBJjXlapqwnLTWmOpQw1VW5qDASDTu5SZbNUI3L:GaQB3EVaLitBd14ptLTKMARyYkIL

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\461f80a7835f6660005e184ceae6df4fa24807836ea4c355182e312131c326c5.exe
    "C:\Users\Admin\AppData\Local\Temp\461f80a7835f6660005e184ceae6df4fa24807836ea4c355182e312131c326c5.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Users\Admin\AppData\Local\hkcmd.exe
      "C:\Users\Admin\AppData\Local\hkcmd.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3036
    • C:\Users\Admin\AppData\Local\Best Fosil Bot 1875.01.exe
      "C:\Users\Admin\AppData\Local\Best Fosil Bot 1875.01.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2236

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Best Fosil Bot 1875.01.exe

    Filesize

    440KB

    MD5

    633875fc24ecb543bb57a0524d7de85b

    SHA1

    cea2629133688eb228f5268a7851ff22a5b5fb46

    SHA256

    6a2c0e3ab4dbf9664da49a0ca133441bdc5d1f8b5bfaa5ab363607af5cab3386

    SHA512

    cd656e1302d78a8119ff2ed568fbefca797ed4905520bf235e3241c113b2510f672e06ec749af54415bbd1be5e06a4fed56a8941f61ec1b716a16bc334e17faa

  • C:\Users\Admin\AppData\Local\Best Fosil Bot 1875.01.exe

    Filesize

    440KB

    MD5

    633875fc24ecb543bb57a0524d7de85b

    SHA1

    cea2629133688eb228f5268a7851ff22a5b5fb46

    SHA256

    6a2c0e3ab4dbf9664da49a0ca133441bdc5d1f8b5bfaa5ab363607af5cab3386

    SHA512

    cd656e1302d78a8119ff2ed568fbefca797ed4905520bf235e3241c113b2510f672e06ec749af54415bbd1be5e06a4fed56a8941f61ec1b716a16bc334e17faa

  • C:\Users\Admin\AppData\Local\hkcmd.exe

    Filesize

    2.6MB

    MD5

    8547c878787692870f6cb73ac772c4e6

    SHA1

    ae44b0581d5c3bee317873cbf0e23044d45eac62

    SHA256

    461f80a7835f6660005e184ceae6df4fa24807836ea4c355182e312131c326c5

    SHA512

    3c0528e914aa2c54bc2dc1f6c9ad71e10eb18c228be8ac77eabbfb71beaf277f4df8582fa491ab53631c20d220b644054646a2a8cc18073c2c5aea293617dd86

  • C:\Users\Admin\AppData\Local\hkcmd.exe

    Filesize

    2.6MB

    MD5

    8547c878787692870f6cb73ac772c4e6

    SHA1

    ae44b0581d5c3bee317873cbf0e23044d45eac62

    SHA256

    461f80a7835f6660005e184ceae6df4fa24807836ea4c355182e312131c326c5

    SHA512

    3c0528e914aa2c54bc2dc1f6c9ad71e10eb18c228be8ac77eabbfb71beaf277f4df8582fa491ab53631c20d220b644054646a2a8cc18073c2c5aea293617dd86

  • memory/3036-147-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-150-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-141-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-142-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-139-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-143-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-144-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-145-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-146-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-149-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-140-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-151-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-152-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-153-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-154-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-155-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-156-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-148-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-157-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-137-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-133-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-136-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/3036-163-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB