Analysis

  • max time kernel
    185s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 16:29

General

  • Target

    6b200ec2fd8e18a8e9c6aa1c902021040740cda5c8b550897f29201c9102f678.exe

  • Size

    236KB

  • MD5

    0098d1c68120a9dacd6321d6110ea121

  • SHA1

    5a1ad7b57971449e6f6584d2377b1d75b67752c4

  • SHA256

    6b200ec2fd8e18a8e9c6aa1c902021040740cda5c8b550897f29201c9102f678

  • SHA512

    55630a68716d185932cd074c58edb2a1fa42214ccbd2124033f78921230263cddef031551d5e88fb10747c79b0e9dcf37a25630bc4889d1121cf5a822e43002b

  • SSDEEP

    6144:isaocyLCOpUBvyGsGbLVRzwYo+GmgkvNb2PWdcs/v5:itobxj5GvVZwp+vvOUj5

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b200ec2fd8e18a8e9c6aa1c902021040740cda5c8b550897f29201c9102f678.exe
    "C:\Users\Admin\AppData\Local\Temp\6b200ec2fd8e18a8e9c6aa1c902021040740cda5c8b550897f29201c9102f678.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3352
    • C:\Users\Admin\AppData\Local\Temp\nsk3AD8.tmp\install.exe
      C:\Users\Admin\AppData\Local\Temp\nsk3AD8.tmp\install.exe 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f /e6032197 /dT131881106S /t
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:3944
      • C:\Users\Admin\AppData\Local\Temp\nsk3AD8.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe
        "C:\Users\Admin\AppData\Local\Temp\nsk3AD8.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe" /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f /e6032197 /dT131881106S /t
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:996

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30

          Filesize

          1KB

          MD5

          3e1c67c01655dfb58651e58837eb910d

          SHA1

          3b0a527046b5c13df725e9515f4248e6dbd1e5d1

          SHA256

          828d874ad567b0713b029403828ef22f5bfd39dafab8e61a1b24caad8be769b0

          SHA512

          47794d05dbccb4c06b5dd60782ebee03c993c94b2af6a77a4a32a1cf8173d1351274582dd606c15fcc8909377c706c49e1f07a394272d26c40097df14f734c23

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

          Filesize

          5B

          MD5

          5bfa51f3a417b98e7443eca90fc94703

          SHA1

          8c015d80b8a23f780bdd215dc842b0f5551f63bd

          SHA256

          bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

          SHA512

          4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30

          Filesize

          412B

          MD5

          8fbd150245cbd4afa3e00edbf9417005

          SHA1

          5d1b4aaf26f2baff88dc0f34413ff6a90524f45f

          SHA256

          5a25967995419cabca0e99e471b4d8baf703261855d471d153a6fa1d8fc59138

          SHA512

          f170cddc8ba92de071239b9f5c3fd972a369e07296e3bf8aa0a52570d4ad9f858e9ba4cf59c0ffa433bcf588c2357b1de96a075f8947e86c4f61d6c507998f19

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

          Filesize

          404B

          MD5

          51dd726303a669452cafb7457af186bf

          SHA1

          968fcfbd43a3041f5503c7f6f38897eea109be38

          SHA256

          4a7fe0e909c9faa94435284334073bfa246635db92b98b6aa0004a551bbb77f4

          SHA512

          6580fb8344a2ff01d4e619f505ff921d1c180b8195e161898921ca17c450298fa5108ef714c21819621085121d5e5df43e03ef107aa75fddb10555fcf53b28c1

        • C:\Users\Admin\AppData\Local\Temp\nsk3AD8.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe

          Filesize

          248KB

          MD5

          22be5edcbe2fd71af6d4a98529a58d88

          SHA1

          974d22883901d75a407c46282ef75acb0187cb21

          SHA256

          c4cfe2563b9681d78283c124f49d0a627be62bd040cabeb94bfeaab2b6733e35

          SHA512

          3d3e9ba2aa4f0b67faa052d304b4186bafe539f6ae88efa38a745246e47a351607a968f8af96fc8b8d78e4cc85dcfd28f009aad47608f855588fd7530910a624

        • C:\Users\Admin\AppData\Local\Temp\nsk3AD8.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe

          Filesize

          248KB

          MD5

          22be5edcbe2fd71af6d4a98529a58d88

          SHA1

          974d22883901d75a407c46282ef75acb0187cb21

          SHA256

          c4cfe2563b9681d78283c124f49d0a627be62bd040cabeb94bfeaab2b6733e35

          SHA512

          3d3e9ba2aa4f0b67faa052d304b4186bafe539f6ae88efa38a745246e47a351607a968f8af96fc8b8d78e4cc85dcfd28f009aad47608f855588fd7530910a624

        • C:\Users\Admin\AppData\Local\Temp\nsk3AD8.tmp\install.exe

          Filesize

          186KB

          MD5

          6952e7f408e985dd1a7123105e80d11e

          SHA1

          f9d5e415463bbfbbe6820e9da4deead31d0e9db0

          SHA256

          0112b9c0972f296a938111dc5f96c4bf6063257271cb69176d229cd551b13295

          SHA512

          e3fc516d8ef5a633535d1973891866bebb92e8556a5742cca220d16c5350312a44ad74b6f98f63f34cae94faa6a7d1841d7b0f33090d7577d7bb117ebdd0b615

        • C:\Users\Admin\AppData\Local\Temp\nsk3AD8.tmp\install.exe

          Filesize

          186KB

          MD5

          6952e7f408e985dd1a7123105e80d11e

          SHA1

          f9d5e415463bbfbbe6820e9da4deead31d0e9db0

          SHA256

          0112b9c0972f296a938111dc5f96c4bf6063257271cb69176d229cd551b13295

          SHA512

          e3fc516d8ef5a633535d1973891866bebb92e8556a5742cca220d16c5350312a44ad74b6f98f63f34cae94faa6a7d1841d7b0f33090d7577d7bb117ebdd0b615

        • C:\Users\Admin\AppData\Local\Temp\nsk3AD8.tmp\nsExec.dll

          Filesize

          8KB

          MD5

          249ae678f0dac4c625c6de6aca53823a

          SHA1

          6ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201

          SHA256

          7298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce

          SHA512

          66e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7

        • memory/996-142-0x0000000074600000-0x0000000074BB1000-memory.dmp

          Filesize

          5.7MB

        • memory/3944-136-0x000000001BD10000-0x000000001C746000-memory.dmp

          Filesize

          10.2MB