Analysis

  • max time kernel
    153s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 14:45

General

  • Target

    eadba38de7aa171945aba1c57ea8b28ef7bdb2b95c122f2f6ceb909ec01ecc4e.exe

  • Size

    1.4MB

  • MD5

    05b287bdfdbc0b6681fbee053486657d

  • SHA1

    5d3c09357bd50a4afdf1e2d109e69b6904234096

  • SHA256

    eadba38de7aa171945aba1c57ea8b28ef7bdb2b95c122f2f6ceb909ec01ecc4e

  • SHA512

    0edafad12a30eaa926a45efb7e050e14d4d308c4de10e9022593c24372d72438854c107d150197e5bc36e129c68d2c55ff3cd0c89fe84f965e0dd6f8a6d2c4ab

  • SSDEEP

    24576:t5QIOyzG7jOSk1E6D9pW7Yx719g/Xhj++IgYXhAlE+CQpshsApIpFhGrL/l2EFRn:tyT4me9DjW7Gx9g/RS+IgYXhiE+CQxAD

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eadba38de7aa171945aba1c57ea8b28ef7bdb2b95c122f2f6ceb909ec01ecc4e.exe
    "C:\Users\Admin\AppData\Local\Temp\eadba38de7aa171945aba1c57ea8b28ef7bdb2b95c122f2f6ceb909ec01ecc4e.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:344
    • C:\Users\Admin\AppData\Local\Temp\FB.exe
      "C:\Users\Admin\AppData\Local\Temp\FB.exe"
      2⤵
      • Executes dropped EXE
      PID:4344
    • C:\Users\Admin\AppData\Local\Temp\·çÔÆ.exe
      "C:\Users\Admin\AppData\Local\Temp\·çÔÆ.exe"
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      PID:1856

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\FB.exe

          Filesize

          453KB

          MD5

          5737123718c168f4c12a852fc13e0628

          SHA1

          6c9ab95640ef7ac2ae77de14dbb9a784acf8d4c9

          SHA256

          52e84d8b72bd2e3523ec43b01c63832c5d6fb51b64372cf77951a2627e7a6f05

          SHA512

          b2520fa35ad9b66da793e238e1d203919c47bef5d60d38d01ecdaa777fb307e482ea8dfff8b216f1d6694d04ea8b7895fdbcd32318ef468de00fda78ac52cbbf

        • C:\Users\Admin\AppData\Local\Temp\FB.exe

          Filesize

          453KB

          MD5

          5737123718c168f4c12a852fc13e0628

          SHA1

          6c9ab95640ef7ac2ae77de14dbb9a784acf8d4c9

          SHA256

          52e84d8b72bd2e3523ec43b01c63832c5d6fb51b64372cf77951a2627e7a6f05

          SHA512

          b2520fa35ad9b66da793e238e1d203919c47bef5d60d38d01ecdaa777fb307e482ea8dfff8b216f1d6694d04ea8b7895fdbcd32318ef468de00fda78ac52cbbf

        • C:\Users\Admin\AppData\Local\Temp\·çÔÆ.exe

          Filesize

          912KB

          MD5

          e35654cd70945dec8eae367705f291fe

          SHA1

          1068caa8b43288370593f3592e25461e914b135d

          SHA256

          0335e741ec08624166474bde6f22055dc2cb3e0be9e64a802003ca6996b18293

          SHA512

          350e62c2b652b6b70fb97e27b336fe40bbd6fef90af2f7e195925063d6351303ad26cab43d7edc9056af3b5f74beb3ff3970d3a154adbfdea2c4ffc820752310

        • C:\Users\Admin\AppData\Local\Temp\·çÔÆ.exe

          Filesize

          912KB

          MD5

          e35654cd70945dec8eae367705f291fe

          SHA1

          1068caa8b43288370593f3592e25461e914b135d

          SHA256

          0335e741ec08624166474bde6f22055dc2cb3e0be9e64a802003ca6996b18293

          SHA512

          350e62c2b652b6b70fb97e27b336fe40bbd6fef90af2f7e195925063d6351303ad26cab43d7edc9056af3b5f74beb3ff3970d3a154adbfdea2c4ffc820752310

        • memory/1856-138-0x0000000000400000-0x0000000000502000-memory.dmp

          Filesize

          1.0MB

        • memory/1856-139-0x0000000000400000-0x0000000000502000-memory.dmp

          Filesize

          1.0MB