Analysis

  • max time kernel
    135s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 18:21

General

  • Target

    e17512e7361167f13914116399d133338b237ac9c906f36fd5fea98f3296519b.exe

  • Size

    58KB

  • MD5

    9b70b385041c21d6862cddbdd4602140

  • SHA1

    07ff685e2d8ff6d973ed76bfb5646e5535ebc5f7

  • SHA256

    e17512e7361167f13914116399d133338b237ac9c906f36fd5fea98f3296519b

  • SHA512

    310eb2bdafc2007ac57f48ff78cb844c9be1b758bc553e8f59954e055aed0619898ada83827e6a22b0e55bef2a19e9ac130257a9337cff6b7408ebe6fe25a64a

  • SSDEEP

    1536:xuAjwXIgMVUPXAjBX1b1kVvigcrPSsZPzP:xgMUXANJ24lj

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e17512e7361167f13914116399d133338b237ac9c906f36fd5fea98f3296519b.exe
    "C:\Users\Admin\AppData\Local\Temp\e17512e7361167f13914116399d133338b237ac9c906f36fd5fea98f3296519b.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\SysWOW64\sc.exe
      sc delete darkness
      2⤵
      • Launches sc.exe
      PID:3344
    • C:\Windows\system\dwm.exe
      "C:\Windows\system\dwm.exe" /start
      2⤵
      • Executes dropped EXE
      PID:3468
  • C:\Windows\system\dwm.exe
    C:\Windows\system\dwm.exe
    1⤵
    • Modifies firewall policy service
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:3472

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\System\dwm.exe

          Filesize

          58KB

          MD5

          9b70b385041c21d6862cddbdd4602140

          SHA1

          07ff685e2d8ff6d973ed76bfb5646e5535ebc5f7

          SHA256

          e17512e7361167f13914116399d133338b237ac9c906f36fd5fea98f3296519b

          SHA512

          310eb2bdafc2007ac57f48ff78cb844c9be1b758bc553e8f59954e055aed0619898ada83827e6a22b0e55bef2a19e9ac130257a9337cff6b7408ebe6fe25a64a

        • C:\Windows\System\dwm.exe

          Filesize

          58KB

          MD5

          9b70b385041c21d6862cddbdd4602140

          SHA1

          07ff685e2d8ff6d973ed76bfb5646e5535ebc5f7

          SHA256

          e17512e7361167f13914116399d133338b237ac9c906f36fd5fea98f3296519b

          SHA512

          310eb2bdafc2007ac57f48ff78cb844c9be1b758bc553e8f59954e055aed0619898ada83827e6a22b0e55bef2a19e9ac130257a9337cff6b7408ebe6fe25a64a

        • C:\Windows\system\dwm.exe

          Filesize

          58KB

          MD5

          9b70b385041c21d6862cddbdd4602140

          SHA1

          07ff685e2d8ff6d973ed76bfb5646e5535ebc5f7

          SHA256

          e17512e7361167f13914116399d133338b237ac9c906f36fd5fea98f3296519b

          SHA512

          310eb2bdafc2007ac57f48ff78cb844c9be1b758bc553e8f59954e055aed0619898ada83827e6a22b0e55bef2a19e9ac130257a9337cff6b7408ebe6fe25a64a

        • memory/2248-133-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2248-134-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2248-137-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3468-140-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3472-141-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB