Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 12:11

General

  • Target

    3d475a2b438a34d06fb7d9451d3a7f1ce3bf3b10a8f01caa2941f9ddd5b6188f.exe

  • Size

    841KB

  • MD5

    c187e8adbe07b83e037b9c6d4837d310

  • SHA1

    a04435d2c4dbad48ce86c9e18414ae9280d24adb

  • SHA256

    3d475a2b438a34d06fb7d9451d3a7f1ce3bf3b10a8f01caa2941f9ddd5b6188f

  • SHA512

    afe02597baca9325cca8c006188c89f048f42fbee9e664db18297c305213485d24476cede6f14928f0883e09177e2a608931fce0bde108c30820350c30e1962e

  • SSDEEP

    24576:5CdWiD87YZ1IhUwl6jMQuaoUSQ042l5tOmSQfvCS+AM:5C0iHI3lC6aoU8jUm9X1

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 49 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d475a2b438a34d06fb7d9451d3a7f1ce3bf3b10a8f01caa2941f9ddd5b6188f.exe
    "C:\Users\Admin\AppData\Local\Temp\3d475a2b438a34d06fb7d9451d3a7f1ce3bf3b10a8f01caa2941f9ddd5b6188f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:4248
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1896
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 1060
      2⤵
      • Program crash
      PID:4900
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2288 -ip 2288
    1⤵
      PID:2388

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Prewodwyyerdeuy..tmp

      Filesize

      3.5MB

      MD5

      1951049d57a12b81d96e53ba69eecc2e

      SHA1

      7c02ee5b4c4f1de5e7955d641c0c4949a9907a22

      SHA256

      f904e96e8666928f318f5515400282402d1f5d4a6f05304b9e92982ef32e3ba4

      SHA512

      e7d4f0fd41b8cb17f3969ad094e114bff74c82d57676a23728bd232b83c36116104c1b364d896681f1b0ce0b6ecb746f47ddafbc0b5ac88801bfd599db5abe15

    • memory/1896-151-0x0000000000000000-mapping.dmp

    • memory/1896-159-0x0000000003020000-0x0000000003B79000-memory.dmp

      Filesize

      11.3MB

    • memory/1896-158-0x0000000003B80000-0x0000000003CC0000-memory.dmp

      Filesize

      1.2MB

    • memory/1896-157-0x0000000003B80000-0x0000000003CC0000-memory.dmp

      Filesize

      1.2MB

    • memory/1896-156-0x0000000003B80000-0x0000000003CC0000-memory.dmp

      Filesize

      1.2MB

    • memory/1896-155-0x0000000003B80000-0x0000000003CC0000-memory.dmp

      Filesize

      1.2MB

    • memory/1896-154-0x0000000003020000-0x0000000003B79000-memory.dmp

      Filesize

      11.3MB

    • memory/1896-152-0x0000000003020000-0x0000000003B79000-memory.dmp

      Filesize

      11.3MB

    • memory/1896-153-0x0000000000A20000-0x0000000001459000-memory.dmp

      Filesize

      10.2MB

    • memory/2288-147-0x0000000006B30000-0x0000000006C70000-memory.dmp

      Filesize

      1.2MB

    • memory/2288-141-0x0000000005C20000-0x0000000006779000-memory.dmp

      Filesize

      11.3MB

    • memory/2288-144-0x0000000006B30000-0x0000000006C70000-memory.dmp

      Filesize

      1.2MB

    • memory/2288-145-0x0000000006B30000-0x0000000006C70000-memory.dmp

      Filesize

      1.2MB

    • memory/2288-132-0x00000000020F3000-0x0000000002194000-memory.dmp

      Filesize

      644KB

    • memory/2288-146-0x0000000006B30000-0x0000000006C70000-memory.dmp

      Filesize

      1.2MB

    • memory/2288-148-0x0000000006B30000-0x0000000006C70000-memory.dmp

      Filesize

      1.2MB

    • memory/2288-150-0x0000000006B30000-0x0000000006C70000-memory.dmp

      Filesize

      1.2MB

    • memory/2288-149-0x0000000006B30000-0x0000000006C70000-memory.dmp

      Filesize

      1.2MB

    • memory/2288-143-0x0000000006B30000-0x0000000006C70000-memory.dmp

      Filesize

      1.2MB

    • memory/2288-142-0x0000000005C20000-0x0000000006779000-memory.dmp

      Filesize

      11.3MB

    • memory/2288-161-0x0000000000400000-0x00000000004F9000-memory.dmp

      Filesize

      996KB

    • memory/2288-138-0x0000000000400000-0x00000000004F9000-memory.dmp

      Filesize

      996KB

    • memory/2288-160-0x0000000005C20000-0x0000000006779000-memory.dmp

      Filesize

      11.3MB

    • memory/2288-133-0x00000000021C0000-0x00000000022B5000-memory.dmp

      Filesize

      980KB

    • memory/2288-134-0x0000000000400000-0x00000000004F9000-memory.dmp

      Filesize

      996KB

    • memory/4248-135-0x0000000000000000-mapping.dmp

    • memory/4248-136-0x0000000000480000-0x0000000000483000-memory.dmp

      Filesize

      12KB

    • memory/4248-137-0x0000000000490000-0x0000000000493000-memory.dmp

      Filesize

      12KB

    • memory/4248-139-0x0000000000490000-0x0000000000493000-memory.dmp

      Filesize

      12KB