Analysis

  • max time kernel
    141s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2022 06:21

General

  • Target

    9a766281ff513c7fdb49bad61fa231b0df56e0cf619c96277aff89068ae14c59.exe

  • Size

    670KB

  • MD5

    cc58c1a971be99b7b03cde435d377d56

  • SHA1

    0f13bf927765ed9bbe4416a92f27d407e22082d3

  • SHA256

    9a766281ff513c7fdb49bad61fa231b0df56e0cf619c96277aff89068ae14c59

  • SHA512

    cf17af3fbdf4110c081af1146fd3126500f4cba8bed6cdf7eaf2de7a6f67c83b7535e87a9c2615062ec911eec11f142b8f16374866c983a3e375c05486de10ae

  • SSDEEP

    12288:VUYjH5A2hCvNMDVWrruKETvEcju1klaGChlY4vZAXMYnrog:VUYjHn3p2EBS14HfXrr

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a766281ff513c7fdb49bad61fa231b0df56e0cf619c96277aff89068ae14c59.exe
    "C:\Users\Admin\AppData\Local\Temp\9a766281ff513c7fdb49bad61fa231b0df56e0cf619c96277aff89068ae14c59.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\dnfÅùö¨0511.exe
      "C:\Users\Admin\AppData\Local\Temp\dnfÅùö¨0511.exe"
      2⤵
      • Executes dropped EXE
      PID:1556
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 224
        3⤵
        • Program crash
        PID:4748
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dnf.vbs"
      2⤵
      • Checks computer location settings
      PID:4328
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1556 -ip 1556
    1⤵
      PID:4448

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\dnf.vbs

      Filesize

      3KB

      MD5

      2e6fea48a5b6fa1bcbf5b84f5486db6d

      SHA1

      9ff234b31c1862ac7cabb929fc42bcd63c12791b

      SHA256

      23382c58adf779514f8e43d308cc70805130c02e0650aa46c9cd7f0595120bf5

      SHA512

      f68b585f131618b45140134620ebdcbddd94b4d69d6967f7797853174c411c114c8bf838a450ea1637f80c531258c7fbd9e8837b876812ac1e351184fc763f28

    • C:\Users\Admin\AppData\Local\Temp\dnfÅùö¨0511.exe

      Filesize

      700KB

      MD5

      8c8504f26205318c0499eb30c03e43b8

      SHA1

      bc32a8a6cac9f6091d41ff90d5ee1c22862e3c26

      SHA256

      33fc27d28881edb39f65f48bac9a87e77335647f34f581b20795e75d81984005

      SHA512

      8e471c05d6728610e008690c357eec82960b700f4396c41b90c76a94097535a1b720f400437284002be4a988cc14c40a0c682e2fa3295ba575fbb9b102a1685d

    • C:\Users\Admin\AppData\Local\Temp\dnfÅùö¨0511.exe

      Filesize

      700KB

      MD5

      8c8504f26205318c0499eb30c03e43b8

      SHA1

      bc32a8a6cac9f6091d41ff90d5ee1c22862e3c26

      SHA256

      33fc27d28881edb39f65f48bac9a87e77335647f34f581b20795e75d81984005

      SHA512

      8e471c05d6728610e008690c357eec82960b700f4396c41b90c76a94097535a1b720f400437284002be4a988cc14c40a0c682e2fa3295ba575fbb9b102a1685d

    • memory/1556-132-0x0000000000000000-mapping.dmp

    • memory/1556-137-0x0000000000400000-0x000000000065F000-memory.dmp

      Filesize

      2.4MB

    • memory/4328-135-0x0000000000000000-mapping.dmp