Analysis

  • max time kernel
    152s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 14:28

General

  • Target

    798dbf16c60e2e96121753c6e399345f10d1f96cc60c19a13b572c317ec6106b.exe

  • Size

    56KB

  • MD5

    05c4389c881e46717dca51c4068379e0

  • SHA1

    eea556f014b2eb41be1514e1d3a25765fef96999

  • SHA256

    798dbf16c60e2e96121753c6e399345f10d1f96cc60c19a13b572c317ec6106b

  • SHA512

    d35d84903b43da396dab9872d62471bca1d9cad4920980c712639b1ed02c2078e608acb7374fbe45141a987699876bc3d8a197c6038e82960b829261e2fd7dd5

  • SSDEEP

    1536:9OhCVsQ3KMfwM2aU8F78Pw4ASDVIIpyaxfC:9zVsQtEyo49UUaRC

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2348
      • C:\Users\Admin\AppData\Local\Temp\798dbf16c60e2e96121753c6e399345f10d1f96cc60c19a13b572c317ec6106b.exe
        "C:\Users\Admin\AppData\Local\Temp\798dbf16c60e2e96121753c6e399345f10d1f96cc60c19a13b572c317ec6106b.exe"
        2⤵
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4844
        • C:\Users\Admin\AppData\Local\Temp\XXX.exe
          C:\Users\Admin\AppData\Local\Temp\\XXX.exe
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4936
          • C:\windows\SysWOW64\cmd.exe
            C:\windows\system32\cmd.exe /c time 04:18:00
            4⤵
              PID:4308
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\t.bat" "
              4⤵
                PID:3452

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\XXX.exe

          Filesize

          35KB

          MD5

          d2779044769d61434d960358dadb8058

          SHA1

          14554925cb01d0eabf390a611946e4dbd618d584

          SHA256

          c34db1617b52ded90409c3e08bafa0c70d20a450b20aba5da41e609c2f4cdf3e

          SHA512

          6460360d20d217c6f33b332029761663218984a957ef228894026da1d82e2d49b6f1dfef75c498188516770d68fbc2c4790e3bbf08d50b0f6eaeedb5807b9c36

        • C:\Users\Admin\AppData\Local\Temp\XXX.exe

          Filesize

          35KB

          MD5

          d2779044769d61434d960358dadb8058

          SHA1

          14554925cb01d0eabf390a611946e4dbd618d584

          SHA256

          c34db1617b52ded90409c3e08bafa0c70d20a450b20aba5da41e609c2f4cdf3e

          SHA512

          6460360d20d217c6f33b332029761663218984a957ef228894026da1d82e2d49b6f1dfef75c498188516770d68fbc2c4790e3bbf08d50b0f6eaeedb5807b9c36

        • C:\Users\Admin\AppData\Local\Temp\t.bat

          Filesize

          130B

          MD5

          76fdf98d3292f1c7e18a0fe0a9e969e0

          SHA1

          e15b44f089e04657fc3267b62fb6570d926339dc

          SHA256

          438f9468c12c57235ed31422efb2b1d4bd55de5172b4b9893b0c8df334079cec

          SHA512

          c17bec0c6b044e2aa392d445a6417446e3b63a4503455198522bbae1c438ea19775c1ba9fc75cd62b123b2234231c17021ef3ba894659fdffb905054251dbeb5

        • memory/4936-135-0x0000000000720000-0x0000000000725000-memory.dmp

          Filesize

          20KB