Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 10:58

General

  • Target

    d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac.exe

  • Size

    324KB

  • MD5

    5b1a94e82706932ecb8b3bf231d33c45

  • SHA1

    1dde29ec55107c496a966597433c4229cf870941

  • SHA256

    d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac

  • SHA512

    9f3a01a9b3b71d281cf427f46047114cbb91d527297de978db592957c631338923f92697d64670bb60fee3e964929ccec13bb331aac33ec4bb9819b4bc4febd5

  • SSDEEP

    6144:VqS46YxH/uPEeO52iy6g+4a92VLMMa5pBFUByndCtoiQ:VqS46Yqn+n8NMFp7wynoG5

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2712
      • C:\Users\Admin\AppData\Local\Temp\d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac.exe
        "C:\Users\Admin\AppData\Local\Temp\d233812d26115fa70ccc131938f293c87294ea85012d1dd4ce1500dd07655cac.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1096
        • C:\Users\Admin\AppData\Local\Temp\Decrypted.exe
          "C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4204

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Decrypted.exe

      Filesize

      56KB

      MD5

      9b251a7f0b0b3fb3a5d5b827f411df42

      SHA1

      384864320445ab01ac13a8ddfd6e73b16cbef05e

      SHA256

      b043d8417320ce15aea85a98e70cfea66365a2aa10c2de7a260fb7c0725c9597

      SHA512

      49b721f7de009178dc8974de985030c47f600953f9e2887ba0db38ced20f50bcc51806f86832b01e95bb4801c6c5069b3b7e012d2176a5fef35af302bcb70a75

    • C:\Users\Admin\AppData\Local\Temp\Decrypted.exe

      Filesize

      56KB

      MD5

      9b251a7f0b0b3fb3a5d5b827f411df42

      SHA1

      384864320445ab01ac13a8ddfd6e73b16cbef05e

      SHA256

      b043d8417320ce15aea85a98e70cfea66365a2aa10c2de7a260fb7c0725c9597

      SHA512

      49b721f7de009178dc8974de985030c47f600953f9e2887ba0db38ced20f50bcc51806f86832b01e95bb4801c6c5069b3b7e012d2176a5fef35af302bcb70a75

    • memory/1096-135-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    • memory/1096-132-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    • memory/1096-138-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    • memory/1096-134-0x00000000021C0000-0x00000000021F9000-memory.dmp

      Filesize

      228KB

    • memory/1096-133-0x0000000002180000-0x0000000002184000-memory.dmp

      Filesize

      16KB

    • memory/1096-142-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    • memory/1096-143-0x00000000021C0000-0x00000000021F9000-memory.dmp

      Filesize

      228KB

    • memory/2712-145-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/4204-144-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4204-146-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/4204-147-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB