Analysis

  • max time kernel
    164s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2022 02:57

General

  • Target

    b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe

  • Size

    333KB

  • MD5

    b57d827eb7e524c3abb42a7941ec1c77

  • SHA1

    b3d2a59e3649217fdad21b3d822a27eda1950fc1

  • SHA256

    b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c

  • SHA512

    1fd8b10e8c3b7b7665a73e62590d1be49055d38a1c026b1967179822b5f8ab41d088094b8bfc2d2fb86ca294c9e86059a63ccd4a399aeb41e96ae49f9015230b

  • SSDEEP

    6144:rjrlCHxyhK7JhqF6muLi8YV+oM/JHLdmQndK1d0Jyc6xBiW/0:HrlzK7vC6HLifEBQlKJMc

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe
    "C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe
      "C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4472
      • C:\Users\Admin\AppData\Local\Temp\update3.exe
        "C:\Users\Admin\AppData\Local\Temp\update3.exe"
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Checks computer location settings
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:900
        • C:\Users\Admin\AppData\Local\volmgr.exe
          "C:\Users\Admin\AppData\Local\volmgr.exe" C:\Users\Admin\AppData\Local\Temp\update3.exe
          4⤵
          • Executes dropped EXE
          PID:3284
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 260
            5⤵
            • Program crash
            PID:1192
      • C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe
        "C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe"
        3⤵
          PID:1480
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
      1⤵
        PID:3248
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3284 -ip 3284
        1⤵
          PID:3452

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\2E00.tmp

          Filesize

          77KB

          MD5

          b07f78bf03bcb08ff33e39ec5a9e93c3

          SHA1

          acf93c06c080f059018202745cdc2f56ca31d4bb

          SHA256

          5df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483

          SHA512

          e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740

        • C:\Users\Admin\AppData\Local\Temp\2E01.tmp

          Filesize

          40KB

          MD5

          bc90c8280b1c0064271e4124d2eb9772

          SHA1

          f6d353c8a92053fe2d433e661a6e10a96d5cf7a0

          SHA256

          39b4bdafdd0873db36327a9c513597ca3350f734e02072bd38c2254aab789efb

          SHA512

          b87dd6962a95390b58355ebf1bd076483de31ef073e879023ab5a7057bfc8d3b1d05fa123fa79368ef9f99f05363feedfbd35570d016b3fb8ad16848046ad110

        • C:\Users\Admin\AppData\Local\Temp\POSITION4DLLNAME.txt

          Filesize

          2KB

          MD5

          d1f3c6b92c7235527535e35fdb593eea

          SHA1

          05d9223fdec4515e629ba7baff48343174352d68

          SHA256

          5bdbe2de48c2e37cfde5a443439d254873157c66d1f205e609b999b6185bc266

          SHA512

          ab0c2fb281a30d5ceaf38e300903936c0b12b2b27fcf6decc212e0cdbda4ff3a9423e6a1a263bb94c0e355ec8647af22003ae3303fe87f77a0c2c0eab9820a7e

        • C:\Users\Admin\AppData\Local\Temp\POSITION4DLLNAME.txt

          Filesize

          2KB

          MD5

          d1f3c6b92c7235527535e35fdb593eea

          SHA1

          05d9223fdec4515e629ba7baff48343174352d68

          SHA256

          5bdbe2de48c2e37cfde5a443439d254873157c66d1f205e609b999b6185bc266

          SHA512

          ab0c2fb281a30d5ceaf38e300903936c0b12b2b27fcf6decc212e0cdbda4ff3a9423e6a1a263bb94c0e355ec8647af22003ae3303fe87f77a0c2c0eab9820a7e

        • C:\Users\Admin\AppData\Local\Temp\update3.exe

          Filesize

          164KB

          MD5

          21af5595448d385d7525a285dec66186

          SHA1

          464a7a95a183075e5819b4c1e960069577283348

          SHA256

          b20f56b3d052deafe9ea3fc6a1e20377c33c4503bd6f543f0e42a52afe19feeb

          SHA512

          f82e80da0293d0d81f73f06c2e718b749a803dcc4eda1111b9038c64fe156fa56693d71f79ef09a5c1a8c3699a61186de8d66c394c5e3ac0d61ed1e8ad705db7

        • C:\Users\Admin\AppData\Local\Temp\update3.exe

          Filesize

          164KB

          MD5

          21af5595448d385d7525a285dec66186

          SHA1

          464a7a95a183075e5819b4c1e960069577283348

          SHA256

          b20f56b3d052deafe9ea3fc6a1e20377c33c4503bd6f543f0e42a52afe19feeb

          SHA512

          f82e80da0293d0d81f73f06c2e718b749a803dcc4eda1111b9038c64fe156fa56693d71f79ef09a5c1a8c3699a61186de8d66c394c5e3ac0d61ed1e8ad705db7

        • C:\Users\Admin\AppData\Local\volmgr.dll

          Filesize

          40KB

          MD5

          bc90c8280b1c0064271e4124d2eb9772

          SHA1

          f6d353c8a92053fe2d433e661a6e10a96d5cf7a0

          SHA256

          39b4bdafdd0873db36327a9c513597ca3350f734e02072bd38c2254aab789efb

          SHA512

          b87dd6962a95390b58355ebf1bd076483de31ef073e879023ab5a7057bfc8d3b1d05fa123fa79368ef9f99f05363feedfbd35570d016b3fb8ad16848046ad110

        • C:\Users\Admin\AppData\Local\volmgr.exe

          Filesize

          77KB

          MD5

          b07f78bf03bcb08ff33e39ec5a9e93c3

          SHA1

          acf93c06c080f059018202745cdc2f56ca31d4bb

          SHA256

          5df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483

          SHA512

          e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740

        • C:\Users\Admin\AppData\Local\volmgr.exe

          Filesize

          77KB

          MD5

          b07f78bf03bcb08ff33e39ec5a9e93c3

          SHA1

          acf93c06c080f059018202745cdc2f56ca31d4bb

          SHA256

          5df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483

          SHA512

          e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740

        • memory/900-139-0x0000000000000000-mapping.dmp

        • memory/900-147-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/900-154-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/900-146-0x0000000000430000-0x000000000045E000-memory.dmp

          Filesize

          184KB

        • memory/1480-143-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/1480-145-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/1480-142-0x0000000000000000-mapping.dmp

        • memory/3284-152-0x0000000000000000-mapping.dmp

        • memory/4472-138-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4472-137-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4472-135-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4472-134-0x0000000000000000-mapping.dmp