Analysis

  • max time kernel
    90s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 23:33

General

  • Target

    f081aff290b96a63ded62dcdec5c548b7a83a1b7df2faf2fe9bf16df435b890c.exe

  • Size

    158KB

  • MD5

    eb59d58706dc05f7a73b338b593c00ec

  • SHA1

    7edafd519c846d391caa54347e65f0bada8ec478

  • SHA256

    f081aff290b96a63ded62dcdec5c548b7a83a1b7df2faf2fe9bf16df435b890c

  • SHA512

    6531cb5242fd59125b4df74381b0c85698056b7b25b8f911ff0d5e67f663945fe0a8e5e4923125a76aad75c9d40a654e197bd0d94e6a04ff7887b6f5ef9fb528

  • SSDEEP

    3072:cSuKWO46D4PydkX4ykeaGybFjuvcZbmcy/yB8nT:3/46dkICaGyhjuLT

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f081aff290b96a63ded62dcdec5c548b7a83a1b7df2faf2fe9bf16df435b890c.exe
    "C:\Users\Admin\AppData\Local\Temp\f081aff290b96a63ded62dcdec5c548b7a83a1b7df2faf2fe9bf16df435b890c.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\10Q9TH~1 >> NUL
      2⤵
        PID:4016
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Windows\syswow64\MsiExec.exe
        "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Users\Admin\AppData\Roaming\DllDropper.dll"
        2⤵
        • Sets service image path in registry
        • Loads dropped DLL
        • Modifies Internet Explorer Phishing Filter
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        PID:1584

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\gcoacyma.msi

            Filesize

            101KB

            MD5

            2f7237f94dcab8d4357012f6c5e5f3ce

            SHA1

            f4c0f4d0c1224fc05e831a3c4bfbbde9c249383e

            SHA256

            0e7197e2dd3b50306c4ac549f4ddd1fc16e3090c3caa2e06839b2ab015a135d0

            SHA512

            3221414fe47563eddcc0f4c1df0493ab24b33f251729b8b7ae761fff0b9937f539b94206aac24d708d8430e72c4b36855d9997085be5c4e623a202d03fe6301b

          • C:\Users\Admin\AppData\Roaming\DllDropper.dll

            Filesize

            74KB

            MD5

            c7a2355764f892b1b21d967a04c4db7c

            SHA1

            99bb8aa60e43fe70adfe519e667b3fabbfb0f2a8

            SHA256

            fe595885e4e2367986518e1e398f49c9eb86109012893482e5ca8ce4baeeb939

            SHA512

            026c98c31f798e3b9f6e255ebc87afbef1b29b7e7cdd40b6dcface95b3bef760b8c014c097b95aa762a06865d5792cf3310cc730df94305b9273ef692b2ddea0

          • C:\Users\Admin\AppData\Roaming\DllDropper.dll

            Filesize

            74KB

            MD5

            c7a2355764f892b1b21d967a04c4db7c

            SHA1

            99bb8aa60e43fe70adfe519e667b3fabbfb0f2a8

            SHA256

            fe595885e4e2367986518e1e398f49c9eb86109012893482e5ca8ce4baeeb939

            SHA512

            026c98c31f798e3b9f6e255ebc87afbef1b29b7e7cdd40b6dcface95b3bef760b8c014c097b95aa762a06865d5792cf3310cc730df94305b9273ef692b2ddea0

          • C:\Users\Admin\AppData\Roaming\DllDropper.dll

            Filesize

            74KB

            MD5

            c7a2355764f892b1b21d967a04c4db7c

            SHA1

            99bb8aa60e43fe70adfe519e667b3fabbfb0f2a8

            SHA256

            fe595885e4e2367986518e1e398f49c9eb86109012893482e5ca8ce4baeeb939

            SHA512

            026c98c31f798e3b9f6e255ebc87afbef1b29b7e7cdd40b6dcface95b3bef760b8c014c097b95aa762a06865d5792cf3310cc730df94305b9273ef692b2ddea0

          • memory/1584-164-0x0000000077360000-0x00000000773DB000-memory.dmp

            Filesize

            492KB

          • memory/1584-166-0x0000000075650000-0x0000000075C03000-memory.dmp

            Filesize

            5.7MB

          • memory/1584-172-0x0000000000390000-0x00000000003B2000-memory.dmp

            Filesize

            136KB

          • memory/1584-174-0x0000000000390000-0x00000000003B2000-memory.dmp

            Filesize

            136KB

          • memory/1584-171-0x0000000076BC0000-0x0000000076CA3000-memory.dmp

            Filesize

            908KB

          • memory/1584-170-0x00000000760A0000-0x000000007611A000-memory.dmp

            Filesize

            488KB

          • memory/1584-169-0x0000000075C60000-0x000000007609C000-memory.dmp

            Filesize

            4.2MB

          • memory/1584-168-0x0000000076760000-0x000000007681F000-memory.dmp

            Filesize

            764KB

          • memory/1584-167-0x00000000762E0000-0x0000000076325000-memory.dmp

            Filesize

            276KB

          • memory/1584-158-0x0000000076CB0000-0x0000000076EC5000-memory.dmp

            Filesize

            2.1MB

          • memory/1584-155-0x0000000000390000-0x00000000003B2000-memory.dmp

            Filesize

            136KB

          • memory/1584-165-0x0000000076330000-0x0000000076450000-memory.dmp

            Filesize

            1.1MB

          • memory/1584-163-0x0000000076200000-0x00000000762DC000-memory.dmp

            Filesize

            880KB

          • memory/1584-162-0x0000000076850000-0x0000000076874000-memory.dmp

            Filesize

            144KB

          • memory/1584-161-0x0000000076F40000-0x0000000076F58000-memory.dmp

            Filesize

            96KB

          • memory/1584-160-0x0000000076940000-0x0000000076AE0000-memory.dmp

            Filesize

            1.6MB

          • memory/1584-159-0x0000000076140000-0x00000000761FF000-memory.dmp

            Filesize

            764KB

          • memory/1584-156-0x00000000775B0000-0x0000000077753000-memory.dmp

            Filesize

            1.6MB

          • memory/4572-138-0x0000000076760000-0x000000007681F000-memory.dmp

            Filesize

            764KB

          • memory/4572-147-0x00000000760A0000-0x000000007611A000-memory.dmp

            Filesize

            488KB

          • memory/4572-135-0x0000000076CB0000-0x0000000076EC5000-memory.dmp

            Filesize

            2.1MB

          • memory/4572-136-0x0000000076140000-0x00000000761FF000-memory.dmp

            Filesize

            764KB

          • memory/4572-137-0x0000000076330000-0x0000000076450000-memory.dmp

            Filesize

            1.1MB

          • memory/4572-149-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/4572-148-0x0000000076BC0000-0x0000000076CA3000-memory.dmp

            Filesize

            908KB

          • memory/4572-132-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/4572-133-0x00000000775B0000-0x0000000077753000-memory.dmp

            Filesize

            1.6MB

          • memory/4572-144-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/4572-145-0x00000000762E0000-0x0000000076325000-memory.dmp

            Filesize

            276KB

          • memory/4572-143-0x0000000077360000-0x00000000773DB000-memory.dmp

            Filesize

            492KB

          • memory/4572-142-0x0000000076200000-0x00000000762DC000-memory.dmp

            Filesize

            880KB

          • memory/4572-141-0x0000000076850000-0x0000000076874000-memory.dmp

            Filesize

            144KB

          • memory/4572-140-0x0000000076F40000-0x0000000076F58000-memory.dmp

            Filesize

            96KB

          • memory/4572-139-0x0000000076940000-0x0000000076AE0000-memory.dmp

            Filesize

            1.6MB

          • memory/4572-146-0x0000000075650000-0x0000000075C03000-memory.dmp

            Filesize

            5.7MB

          • memory/4572-176-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB