Analysis

  • max time kernel
    117s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 21:13

General

  • Target

    608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe

  • Size

    8.7MB

  • MD5

    79e3697f4088a2a17c20ba1d8d085250

  • SHA1

    6be58799b742ada1a4093daf1583fd122828e920

  • SHA256

    608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20

  • SHA512

    1915aff015ebd942cad71a1bc966cc6697a105491bf20f286c089b6da395fd586a7140232b41ae140643b73cff955dfc3b380ee1f7b5623cc9b123c09dfe16a0

  • SSDEEP

    98304:atztZtGtztxtGtztktGtztvtGtztHtGtzt:8BjABrAB6ABlABNAB

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 13 IoCs
  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe
    "C:\Users\Admin\AppData\Local\Temp\608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4720
    • C:\Users\Admin\AppData\Local\Temp\tmp240592296.exe
      C:\Users\Admin\AppData\Local\Temp\tmp240592296.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4924
      • C:\Windows\SysWOW64\notpad.exe
        "C:\Windows\system32\notpad.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Users\Admin\AppData\Local\Temp\tmp240610109.exe
          C:\Users\Admin\AppData\Local\Temp\tmp240610109.exe
          4⤵
          • Executes dropped EXE
          PID:4700
        • C:\Users\Admin\AppData\Local\Temp\tmp240610578.exe
          C:\Users\Admin\AppData\Local\Temp\tmp240610578.exe
          4⤵
          • Executes dropped EXE
          PID:4936
    • C:\Users\Admin\AppData\Local\Temp\tmp240593593.exe
      C:\Users\Admin\AppData\Local\Temp\tmp240593593.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4812
      • C:\Users\Admin\AppData\Local\Temp\tmp240593765.exe
        C:\Users\Admin\AppData\Local\Temp\tmp240593765.exe
        3⤵
        • Executes dropped EXE
        PID:4880
      • C:\Users\Admin\AppData\Local\Temp\tmp240593937.exe
        C:\Users\Admin\AppData\Local\Temp\tmp240593937.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4788
        • C:\Users\Admin\AppData\Local\Temp\tmp240594265.exe
          C:\Users\Admin\AppData\Local\Temp\tmp240594265.exe
          4⤵
          • Executes dropped EXE
          PID:1456
        • C:\Users\Admin\AppData\Local\Temp\tmp240594312.exe
          C:\Users\Admin\AppData\Local\Temp\tmp240594312.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3400
  • C:\Users\Admin\AppData\Local\Temp\tmp240594796.exe
    C:\Users\Admin\AppData\Local\Temp\tmp240594796.exe
    1⤵
    • Executes dropped EXE
    PID:2984
  • C:\Users\Admin\AppData\Local\Temp\tmp240594656.exe
    C:\Users\Admin\AppData\Local\Temp\tmp240594656.exe
    1⤵
    • Executes dropped EXE
    PID:3616
  • C:\Users\Admin\AppData\Local\Temp\tmp240594593.exe
    C:\Users\Admin\AppData\Local\Temp\tmp240594593.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1624
  • C:\Users\Admin\AppData\Local\Temp\tmp240594562.exe
    C:\Users\Admin\AppData\Local\Temp\tmp240594562.exe
    1⤵
    • Executes dropped EXE
    PID:4436

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp240592296.exe

    Filesize

    123KB

    MD5

    d58fe1e8fe18394e0995986429b2ca3b

    SHA1

    f73633b5b0b6c1224810f8472d16824cdeb132bc

    SHA256

    70fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4

    SHA512

    f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634

  • C:\Users\Admin\AppData\Local\Temp\tmp240592296.exe

    Filesize

    123KB

    MD5

    d58fe1e8fe18394e0995986429b2ca3b

    SHA1

    f73633b5b0b6c1224810f8472d16824cdeb132bc

    SHA256

    70fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4

    SHA512

    f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634

  • C:\Users\Admin\AppData\Local\Temp\tmp240593593.exe

    Filesize

    604KB

    MD5

    5929b9c23f95836c6149366e454ac3fe

    SHA1

    4e0ad0d87f71e29b47c351890c9509ff0a319939

    SHA256

    35cb4e3e6e11540bdce92a1d580460fbdf152c7eec4b2bab0990d3c2bf4ea039

    SHA512

    7ad7e0d568b8add6c3a2f52eac8a348282b9704f10a129e7aa6f4ca479bd01d20744012e8f26cbd230df3e2af1533ef016e72aec7101afde003e0e05350789bf

  • C:\Users\Admin\AppData\Local\Temp\tmp240593593.exe

    Filesize

    604KB

    MD5

    5929b9c23f95836c6149366e454ac3fe

    SHA1

    4e0ad0d87f71e29b47c351890c9509ff0a319939

    SHA256

    35cb4e3e6e11540bdce92a1d580460fbdf152c7eec4b2bab0990d3c2bf4ea039

    SHA512

    7ad7e0d568b8add6c3a2f52eac8a348282b9704f10a129e7aa6f4ca479bd01d20744012e8f26cbd230df3e2af1533ef016e72aec7101afde003e0e05350789bf

  • C:\Users\Admin\AppData\Local\Temp\tmp240593765.exe

    Filesize

    123KB

    MD5

    d58fe1e8fe18394e0995986429b2ca3b

    SHA1

    f73633b5b0b6c1224810f8472d16824cdeb132bc

    SHA256

    70fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4

    SHA512

    f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634

  • C:\Users\Admin\AppData\Local\Temp\tmp240593765.exe

    Filesize

    123KB

    MD5

    d58fe1e8fe18394e0995986429b2ca3b

    SHA1

    f73633b5b0b6c1224810f8472d16824cdeb132bc

    SHA256

    70fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4

    SHA512

    f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634

  • C:\Users\Admin\AppData\Local\Temp\tmp240593937.exe

    Filesize

    470KB

    MD5

    445e69fdab59983dd16d8b6a883250fd

    SHA1

    60868b848296c467aa8963263ca7d85e3786e57e

    SHA256

    aadd8c840d64d9dffb1af59bdbbfecd6fb5e8b68eb7070b2ac1cb2c33f01898d

    SHA512

    14d99b4f1c55326861b64d63259cd62fb6a12ce49dfc1cc48c181645334812db95615fdfd5632f5049bed975b9eaf2403005389c492e6b747408c3e31f33a904

  • C:\Users\Admin\AppData\Local\Temp\tmp240593937.exe

    Filesize

    470KB

    MD5

    445e69fdab59983dd16d8b6a883250fd

    SHA1

    60868b848296c467aa8963263ca7d85e3786e57e

    SHA256

    aadd8c840d64d9dffb1af59bdbbfecd6fb5e8b68eb7070b2ac1cb2c33f01898d

    SHA512

    14d99b4f1c55326861b64d63259cd62fb6a12ce49dfc1cc48c181645334812db95615fdfd5632f5049bed975b9eaf2403005389c492e6b747408c3e31f33a904

  • C:\Users\Admin\AppData\Local\Temp\tmp240594265.exe

    Filesize

    123KB

    MD5

    d58fe1e8fe18394e0995986429b2ca3b

    SHA1

    f73633b5b0b6c1224810f8472d16824cdeb132bc

    SHA256

    70fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4

    SHA512

    f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634

  • C:\Users\Admin\AppData\Local\Temp\tmp240594265.exe

    Filesize

    123KB

    MD5

    d58fe1e8fe18394e0995986429b2ca3b

    SHA1

    f73633b5b0b6c1224810f8472d16824cdeb132bc

    SHA256

    70fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4

    SHA512

    f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634

  • C:\Users\Admin\AppData\Local\Temp\tmp240594312.exe

    Filesize

    335KB

    MD5

    5a9c79aa36b764c745b177eca44ffc38

    SHA1

    698fc30a496cdb13d820e82ef2eded5b31fc4d39

    SHA256

    6331de09ae2ca9deef3b73c30c797220defce425fb89c3109a9d7ce7704c18d1

    SHA512

    6939ac545d3675c15d42cad54675d9c986891ab026aac9ef5e7167d3e509fe4ad895a417e5c3c05613eed6ccd1bf19ebbff0fe710ae2e73eb912b421065ca845

  • C:\Users\Admin\AppData\Local\Temp\tmp240594312.exe

    Filesize

    335KB

    MD5

    5a9c79aa36b764c745b177eca44ffc38

    SHA1

    698fc30a496cdb13d820e82ef2eded5b31fc4d39

    SHA256

    6331de09ae2ca9deef3b73c30c797220defce425fb89c3109a9d7ce7704c18d1

    SHA512

    6939ac545d3675c15d42cad54675d9c986891ab026aac9ef5e7167d3e509fe4ad895a417e5c3c05613eed6ccd1bf19ebbff0fe710ae2e73eb912b421065ca845

  • C:\Users\Admin\AppData\Local\Temp\tmp240594562.exe

    Filesize

    123KB

    MD5

    d58fe1e8fe18394e0995986429b2ca3b

    SHA1

    f73633b5b0b6c1224810f8472d16824cdeb132bc

    SHA256

    70fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4

    SHA512

    f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634

  • C:\Users\Admin\AppData\Local\Temp\tmp240594562.exe

    Filesize

    123KB

    MD5

    d58fe1e8fe18394e0995986429b2ca3b

    SHA1

    f73633b5b0b6c1224810f8472d16824cdeb132bc

    SHA256

    70fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4

    SHA512

    f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634

  • C:\Users\Admin\AppData\Local\Temp\tmp240594593.exe

    Filesize

    201KB

    MD5

    2280cf04f6dc9d3f8edf4d91ae30c52b

    SHA1

    964329c715430e8a670dc959de2db0d09616c0cb

    SHA256

    e025ea0d8b3b4aebad30d407d8e2b34cbf8d65e3eb26fe31db0a81ebfcf8f5c5

    SHA512

    1c0244e0d3b6619417136056cb0ec4f972649251f8105595a3aeebdcfc4a9784a83c710b4cf56fd81e8f3cde2b4e25eea6e1fd745ab936b24adfd92086de412b

  • C:\Users\Admin\AppData\Local\Temp\tmp240594593.exe

    Filesize

    201KB

    MD5

    2280cf04f6dc9d3f8edf4d91ae30c52b

    SHA1

    964329c715430e8a670dc959de2db0d09616c0cb

    SHA256

    e025ea0d8b3b4aebad30d407d8e2b34cbf8d65e3eb26fe31db0a81ebfcf8f5c5

    SHA512

    1c0244e0d3b6619417136056cb0ec4f972649251f8105595a3aeebdcfc4a9784a83c710b4cf56fd81e8f3cde2b4e25eea6e1fd745ab936b24adfd92086de412b

  • C:\Users\Admin\AppData\Local\Temp\tmp240594656.exe

    Filesize

    123KB

    MD5

    d58fe1e8fe18394e0995986429b2ca3b

    SHA1

    f73633b5b0b6c1224810f8472d16824cdeb132bc

    SHA256

    70fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4

    SHA512

    f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634

  • C:\Users\Admin\AppData\Local\Temp\tmp240594656.exe

    Filesize

    123KB

    MD5

    d58fe1e8fe18394e0995986429b2ca3b

    SHA1

    f73633b5b0b6c1224810f8472d16824cdeb132bc

    SHA256

    70fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4

    SHA512

    f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634

  • C:\Users\Admin\AppData\Local\Temp\tmp240594796.exe

    Filesize

    67KB

    MD5

    5e28284f9b5f9097640d58a73d38ad4c

    SHA1

    7a90f8b051bc82cc9cadbcc9ba345ced02891a6c

    SHA256

    865f34fe7ba81e9622ddbdfc511547d190367bbf3dad21ceb6da3eec621044f5

    SHA512

    cb7218cfea8813ae8c7acf6f7511aecbeb9d697986e0eb8538065bf9e3e9c6ced9c29270eb677f5acf08d2e94b21018d8c4a376aa646fa73ce831fc87d448934

  • C:\Users\Admin\AppData\Local\Temp\tmp240594796.exe

    Filesize

    67KB

    MD5

    5e28284f9b5f9097640d58a73d38ad4c

    SHA1

    7a90f8b051bc82cc9cadbcc9ba345ced02891a6c

    SHA256

    865f34fe7ba81e9622ddbdfc511547d190367bbf3dad21ceb6da3eec621044f5

    SHA512

    cb7218cfea8813ae8c7acf6f7511aecbeb9d697986e0eb8538065bf9e3e9c6ced9c29270eb677f5acf08d2e94b21018d8c4a376aa646fa73ce831fc87d448934

  • C:\Users\Admin\AppData\Local\Temp\tmp240610109.exe

    Filesize

    123KB

    MD5

    d58fe1e8fe18394e0995986429b2ca3b

    SHA1

    f73633b5b0b6c1224810f8472d16824cdeb132bc

    SHA256

    70fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4

    SHA512

    f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634

  • C:\Users\Admin\AppData\Local\Temp\tmp240610109.exe

    Filesize

    123KB

    MD5

    d58fe1e8fe18394e0995986429b2ca3b

    SHA1

    f73633b5b0b6c1224810f8472d16824cdeb132bc

    SHA256

    70fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4

    SHA512

    f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634

  • C:\Users\Admin\AppData\Local\Temp\tmp240610578.exe

    Filesize

    162KB

    MD5

    e92d3a824a0578a50d2dd81b5060145f

    SHA1

    50ef7c645fd5cbb95d50fbaddf6213800f9296ec

    SHA256

    87f53bc444c05230ce439dbb127c03f2e374067d6fb08e91c834371fd9ecf661

    SHA512

    40d0ac6fa5a424b099923fcdb465e9a2f44569af1c75cf05323315a8720517316a7e8627be248cff3a83382fb6db1cf026161f627a39bc1908e63f67a34c0fd5

  • C:\Windows\SysWOW64\notpad.exe

    Filesize

    296KB

    MD5

    64dc26441d16d0d2c9761c08a1f5fa60

    SHA1

    2fdeb240241d4e0e131fa1de34173c3d8eb6360e

    SHA256

    5e86a3a641752af6f89a7ec7add17e347818720aa9051e334eb37ad6ad2bba4e

    SHA512

    cc662645a655f4e1ee7ff556bf5363377b2789b5f0552f4208906a43970d384c5faa9cc6065b1ca65d753672cbdf06076424146bc630b6f747b1058b648d6942

  • C:\Windows\SysWOW64\notpad.exe

    Filesize

    296KB

    MD5

    64dc26441d16d0d2c9761c08a1f5fa60

    SHA1

    2fdeb240241d4e0e131fa1de34173c3d8eb6360e

    SHA256

    5e86a3a641752af6f89a7ec7add17e347818720aa9051e334eb37ad6ad2bba4e

    SHA512

    cc662645a655f4e1ee7ff556bf5363377b2789b5f0552f4208906a43970d384c5faa9cc6065b1ca65d753672cbdf06076424146bc630b6f747b1058b648d6942

  • memory/1624-168-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-172-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-178-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3400-160-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4720-161-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4720-132-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4788-148-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4788-153-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4812-144-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB