Analysis

  • max time kernel
    199s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 11:36

General

  • Target

    a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe

  • Size

    7.5MB

  • MD5

    642799dc8b9bb37f7698e1091395361f

  • SHA1

    f2739353a153f8e7a5f857f527529ae6bca5a20c

  • SHA256

    a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44

  • SHA512

    4b39f7caebca70526d53a57fbf80765fdbb57e9f9f6084b6d6fcfbcd1639522dd2084424f491c31e6c0023ef2427403679f23143fa3938562a1b1ab0d8ebc872

  • SSDEEP

    196608:SsEcYtKe4gFPwwBkArzNsucRv3TG2mHVF+P+bj+6Q9fTtoABFF3Doz2AfEl/P3r9:ycYtKetFPwwBkArzNsucRv3TG2mHVF+F

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe
    "C:\Users\Admin\AppData\Local\Temp\a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Users\Admin\AppData\Local\Temp\a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe
      "C:\Users\Admin\AppData\Local\Temp\a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe"
      2⤵
        PID:4956
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 472
          3⤵
          • Program crash
          PID:4664
      • C:\Users\Admin\AppData\Roaming\240606812.exe
        "C:\Users\Admin\AppData\Roaming\240606812.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Users\Admin\AppData\Local\Temp\explorer.exe
          "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:3120
        • C:\Users\Admin\AppData\Local\Temp\legit.exe
          "C:\Users\Admin\AppData\Local\Temp\legit.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1268
          • C:\Users\Admin\AppData\Local\Temp\is-FAPTA.tmp\is-3I1L7.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-FAPTA.tmp\is-3I1L7.tmp" /SL4 $A01BE C:\Users\Admin\AppData\Local\Temp\legit.exe 1475270 51200
            4⤵
            • Executes dropped EXE
            PID:1572
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4956 -ip 4956
      1⤵
        PID:3608

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\explorer.exe

              Filesize

              3.1MB

              MD5

              e2da1cea135d6f225a88e1928c7dc99e

              SHA1

              c7e300d9c46146f9c3fc914c86cdac5cd9d77ff0

              SHA256

              3795e3144370de9b6444c245add375789b941ff161349be8d0f0c63ada93391d

              SHA512

              927d4fe20516779c0c305e25d3d462e0e10cece22945f0031bb59f0831408afb4848f488f88f5d253bd7c610af5d64ea6288f8b3139108d760574088c741b5ae

            • C:\Users\Admin\AppData\Local\Temp\explorer.exe

              Filesize

              3.1MB

              MD5

              e2da1cea135d6f225a88e1928c7dc99e

              SHA1

              c7e300d9c46146f9c3fc914c86cdac5cd9d77ff0

              SHA256

              3795e3144370de9b6444c245add375789b941ff161349be8d0f0c63ada93391d

              SHA512

              927d4fe20516779c0c305e25d3d462e0e10cece22945f0031bb59f0831408afb4848f488f88f5d253bd7c610af5d64ea6288f8b3139108d760574088c741b5ae

            • C:\Users\Admin\AppData\Local\Temp\is-FAPTA.tmp\is-3I1L7.tmp

              Filesize

              610KB

              MD5

              365e4b9988123eef3955a4fb28a9be93

              SHA1

              f2eacd886960eca81ba4c1e1e82f9e70711c296d

              SHA256

              cc85b7b90d427ca6f3b4c25593368bce1337eb475207aeed1ae2f9721b2370f9

              SHA512

              07f90c47216af13b0c059a08e226e3cf3de452f562fb40778195ce82344f6d2e17adc2a3456f618e508fcf1add5348685171ee7c0ec3fefdff327633e63b2991

            • C:\Users\Admin\AppData\Local\Temp\is-FAPTA.tmp\is-3I1L7.tmp

              Filesize

              610KB

              MD5

              365e4b9988123eef3955a4fb28a9be93

              SHA1

              f2eacd886960eca81ba4c1e1e82f9e70711c296d

              SHA256

              cc85b7b90d427ca6f3b4c25593368bce1337eb475207aeed1ae2f9721b2370f9

              SHA512

              07f90c47216af13b0c059a08e226e3cf3de452f562fb40778195ce82344f6d2e17adc2a3456f618e508fcf1add5348685171ee7c0ec3fefdff327633e63b2991

            • C:\Users\Admin\AppData\Local\Temp\legit.exe

              Filesize

              1.6MB

              MD5

              ed57ac2313648d8ac358af586df72ac3

              SHA1

              e46a95842bcf27163576a8d15ac0b5f9c93d7fe5

              SHA256

              b0a546677a45f1061b868e00562e91fc6939da47fdfe7ab2e7a3f202502686f9

              SHA512

              95eedb429f8cf22e0b09604b8a12ad3591aec3e66fe68ce62f2a711970adf2db3e6965ddabd4b239f8d848c42a71c3cf7644bd6ff07991dfec8c8b30167bba97

            • C:\Users\Admin\AppData\Local\Temp\legit.exe

              Filesize

              1.6MB

              MD5

              ed57ac2313648d8ac358af586df72ac3

              SHA1

              e46a95842bcf27163576a8d15ac0b5f9c93d7fe5

              SHA256

              b0a546677a45f1061b868e00562e91fc6939da47fdfe7ab2e7a3f202502686f9

              SHA512

              95eedb429f8cf22e0b09604b8a12ad3591aec3e66fe68ce62f2a711970adf2db3e6965ddabd4b239f8d848c42a71c3cf7644bd6ff07991dfec8c8b30167bba97

            • C:\Users\Admin\AppData\Roaming\240606812.exe

              Filesize

              7.4MB

              MD5

              311dc8d6943b738dda5397ea2b012afe

              SHA1

              3b5ec42a632343a69da8247286942539a21f8ac2

              SHA256

              ebcb04517b36e2b5470c97bb859590402e91deb1a9ebe7a42b232793f56d6aa3

              SHA512

              3af9aaa201516c26689b4c216fe4af86e1f671498ea578c98202c7a006d3e34b4934367a93687bb96d4ea37c80e46d0676981735e431f61cd62bc544b307d03a

            • C:\Users\Admin\AppData\Roaming\240606812.exe

              Filesize

              7.4MB

              MD5

              311dc8d6943b738dda5397ea2b012afe

              SHA1

              3b5ec42a632343a69da8247286942539a21f8ac2

              SHA256

              ebcb04517b36e2b5470c97bb859590402e91deb1a9ebe7a42b232793f56d6aa3

              SHA512

              3af9aaa201516c26689b4c216fe4af86e1f671498ea578c98202c7a006d3e34b4934367a93687bb96d4ea37c80e46d0676981735e431f61cd62bc544b307d03a

            • memory/1268-158-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/1268-160-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/1268-164-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/1996-142-0x00000000026E0000-0x000000000277D000-memory.dmp

              Filesize

              628KB

            • memory/3120-146-0x0000000010000000-0x0000000010010000-memory.dmp

              Filesize

              64KB

            • memory/3120-154-0x00000000025A0000-0x0000000002699000-memory.dmp

              Filesize

              996KB

            • memory/4956-138-0x0000000000400000-0x0000000000408000-memory.dmp

              Filesize

              32KB

            • memory/4956-134-0x0000000000400000-0x0000000000408000-memory.dmp

              Filesize

              32KB

            • memory/4956-135-0x0000000000400000-0x0000000000408000-memory.dmp

              Filesize

              32KB

            • memory/4956-136-0x0000000000400000-0x0000000000408000-memory.dmp

              Filesize

              32KB

            • memory/4956-133-0x0000000000400000-0x0000000000408000-memory.dmp

              Filesize

              32KB