Analysis

  • max time kernel
    163s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 21:22

General

  • Target

    f742827806c3cacd954cf5d2c9c673ccc8acb35fae240a7377aef03189b6db5c.exe

  • Size

    205KB

  • MD5

    1a60532f99a506ced2da08d40f62e5f0

  • SHA1

    3b645bd81a28a1ef1eedba1448604de96407515c

  • SHA256

    f742827806c3cacd954cf5d2c9c673ccc8acb35fae240a7377aef03189b6db5c

  • SHA512

    abc2d8fb5edb07bbd7f346481aff495465a4c7db00ac0253e8ea37e3084d807ac1d8de95ee557b6834513479f767d7aa004cf013be44912190d49a94fe41312f

  • SSDEEP

    6144:CkwK8wI9HZ/xaof8MZspHdr1CfCwZMeGQ/AZ:PmFZ/b8MZGHIl/AZ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Unexpected DNS network traffic destination 35 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f742827806c3cacd954cf5d2c9c673ccc8acb35fae240a7377aef03189b6db5c.exe
    "C:\Users\Admin\AppData\Local\Temp\f742827806c3cacd954cf5d2c9c673ccc8acb35fae240a7377aef03189b6db5c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Users\Admin\AppData\Local\Temp\check.exe
      C:\Users\Admin\AppData\Local\Temp\check.exe e -o+ -pSSxDIIjg0HmNoxE6POaBLbhlOWJl7 package.tmp
      2⤵
      • Executes dropped EXE
      PID:4924
    • C:\Users\Admin\AppData\Local\Temp\tmp1.exe
      C:\Users\Admin\AppData\Local\Temp\tmp1.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Modifies WinLogon
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3076
      • C:\Windows\bfsvc.exe
        C:\Windows\bfsvc.exe
        3⤵
          PID:404
        • C:\Windows\bfsvc.exe
          C:\Windows\bfsvc.exe
          3⤵
            PID:3264
        • C:\Users\Admin\AppData\Local\Temp\tmp2.exe
          C:\Users\Admin\AppData\Local\Temp\tmp2.exe
          2⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Modifies Control Panel
          PID:2652

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\check.exe

        Filesize

        199KB

        MD5

        42ef3012ffc38db6df75d9e52ee8caa7

        SHA1

        110191a2414670e8f02179287f099a6099f1a6a5

        SHA256

        5f20eebd9440f7f6af88200dfdd5d8bbe17a49174273390cdc498ba6296065e8

        SHA512

        4d932b0e2272e7243745ff02db2157c494fc2e15db052ad726c1d500d63275b400caa36522d5ec0910f7329219d996307d3813995560940347a8e6e35090de1d

      • C:\Users\Admin\AppData\Local\Temp\check.exe

        Filesize

        199KB

        MD5

        42ef3012ffc38db6df75d9e52ee8caa7

        SHA1

        110191a2414670e8f02179287f099a6099f1a6a5

        SHA256

        5f20eebd9440f7f6af88200dfdd5d8bbe17a49174273390cdc498ba6296065e8

        SHA512

        4d932b0e2272e7243745ff02db2157c494fc2e15db052ad726c1d500d63275b400caa36522d5ec0910f7329219d996307d3813995560940347a8e6e35090de1d

      • C:\Users\Admin\AppData\Local\Temp\nsfC78D.tmp\ExecDos.dll

        Filesize

        5KB

        MD5

        a7cd6206240484c8436c66afb12bdfbf

        SHA1

        0bb3e24a7eb0a9e5a8eae06b1c6e7551a7ec9919

        SHA256

        69ac56d2fdf3c71b766d3cc49b33b36f1287cc2503310811017467dfcb455926

        SHA512

        b9ee7803301e50a8ec20ab3f87eb9e509ea24d11a69e90005f30c1666acc4ed0a208bd56e372e2e5c6a6d901d45f04a12427303d74761983593d10b344c79904

      • C:\Users\Admin\AppData\Local\Temp\package.tmp

        Filesize

        46KB

        MD5

        d6c21b152d1f53f581cf04754f66ed0a

        SHA1

        47a30b2a47eb5a082f623e4d97f476f109073de9

        SHA256

        6d3f07275d832be2f2ac4904b7066608b81866402df5d07a062f333430739dd2

        SHA512

        eb557889043aed5049c345fc445460e011731575f39f25d7b4c904140bd6efde54507545f5513ec4a9323b107b09a6bc51a944fe949ddbbf60daf1fb65c7520b

      • C:\Users\Admin\AppData\Local\Temp\tmp1.exe

        Filesize

        70KB

        MD5

        0c8c62e977e195472522ac306ec912b6

        SHA1

        6cd34d706700e06570cc0da69a1d0b2c9c45442b

        SHA256

        c0ba8b268f928148a99f5cd7965092bba04fe71fb9588ad5079c04bfaedecdd5

        SHA512

        e3bcebccf110a3770814373c3ea4f192577ca6d923c67c5682e0c9d40c67d8887f749a138a942a60ba415bb793691556ccf2ddc760ce7613c60edb00efb157cb

      • C:\Users\Admin\AppData\Local\Temp\tmp1.exe

        Filesize

        70KB

        MD5

        0c8c62e977e195472522ac306ec912b6

        SHA1

        6cd34d706700e06570cc0da69a1d0b2c9c45442b

        SHA256

        c0ba8b268f928148a99f5cd7965092bba04fe71fb9588ad5079c04bfaedecdd5

        SHA512

        e3bcebccf110a3770814373c3ea4f192577ca6d923c67c5682e0c9d40c67d8887f749a138a942a60ba415bb793691556ccf2ddc760ce7613c60edb00efb157cb

      • C:\Users\Admin\AppData\Local\Temp\tmp2.exe

        Filesize

        7KB

        MD5

        9ce53452efd7595f10eb426547216d64

        SHA1

        46387da4fa8fb3a807957ec24080fc24a9828732

        SHA256

        dfed42b0dc0cdd1d5258bbfe080147eb80dff1b23b54c5fb43eae5ad2fd50bf5

        SHA512

        4189d056672ec07c1d4359ed4109a2d01c43699ad30b66439266284bd46b78a1bda6b6afe1c919eb2492fd1480b5f95e45d346e2805fdf8f87db344f7e4d931a

      • C:\Users\Admin\AppData\Local\Temp\tmp2.exe

        Filesize

        7KB

        MD5

        9ce53452efd7595f10eb426547216d64

        SHA1

        46387da4fa8fb3a807957ec24080fc24a9828732

        SHA256

        dfed42b0dc0cdd1d5258bbfe080147eb80dff1b23b54c5fb43eae5ad2fd50bf5

        SHA512

        4189d056672ec07c1d4359ed4109a2d01c43699ad30b66439266284bd46b78a1bda6b6afe1c919eb2492fd1480b5f95e45d346e2805fdf8f87db344f7e4d931a

      • memory/2652-144-0x0000000000400000-0x0000000000403000-memory.dmp

        Filesize

        12KB

      • memory/3076-142-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/3076-145-0x000000006B800000-0x000000006B8F0000-memory.dmp

        Filesize

        960KB

      • memory/3076-158-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB