Analysis

  • max time kernel
    194s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 14:06

General

  • Target

    c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe

  • Size

    206KB

  • MD5

    ecce578d57f3ef52ede4dceed905b14a

  • SHA1

    21cb1eec7a55a6de3ea49ce6f672bcfc059ad564

  • SHA256

    c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571

  • SHA512

    69d28ece2017d958254034bf0fb956a94ebb2ffded11e457e422a6a6ff494fcc3bbce47d2c55ae8ce77730cfa963cb27c645ac3de25efc28a0b4b910c824cb6e

  • SSDEEP

    6144:ugqqULirVT01d6a5vR36hMmOii1i2DpFJF1:u0rVwv6a5vRMMmOii1i2FFJ

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe
    "C:\Users\Admin\AppData\Local\Temp\c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:724
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Users\Admin\AppData\Local\Temp\c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe"
      2⤵
        PID:4592

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/724-132-0x0000000001000000-0x0000000001072000-memory.dmp

      Filesize

      456KB

    • memory/724-134-0x0000000001000000-0x0000000001072000-memory.dmp

      Filesize

      456KB