Analysis

  • max time kernel
    188s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 15:07

General

  • Target

    8b8851878c1d9a6c5cf55348384e5dcb2fa441566be0e1a65f0cce43d84dedfa.exe

  • Size

    360KB

  • MD5

    732cdf0b27a32489411c9362859f7632

  • SHA1

    2e72e9cd2782328ab35315c0875ff44947f53652

  • SHA256

    8b8851878c1d9a6c5cf55348384e5dcb2fa441566be0e1a65f0cce43d84dedfa

  • SHA512

    428accb2ad6b1c73b60d26dadbf6c399b5a2744eab1e45cebfd2d392a2d718449a25ca012a83ecc7c0f350819a7a42649b2b0e27ff55edc167d9ed85ec06a86d

  • SSDEEP

    6144:Kl8ibNjFefg+sDYwXNlckN7CgJzOGsqB6cd1:4bjFTtGqCgJKfe1

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b8851878c1d9a6c5cf55348384e5dcb2fa441566be0e1a65f0cce43d84dedfa.exe
    "C:\Users\Admin\AppData\Local\Temp\8b8851878c1d9a6c5cf55348384e5dcb2fa441566be0e1a65f0cce43d84dedfa.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Windows\ntkrnlpa.exe
      C:\Windows\ntkrnlpa.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4320
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tsrv.bat" "
      2⤵
        PID:1180

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tsrv.bat

      Filesize

      252B

      MD5

      b7ca6bf706fa6b946260f8adc36c5ce4

      SHA1

      d0db6693a7b8011cea8c02668b2dd5575bd08a80

      SHA256

      441a832e064c3eb8eed3fded52f7f7f5c3014180244fcadd2698594760c9a48d

      SHA512

      351d313d00ef791d33eb16d1e0c36f0d553fabd7b079f177de0131a63c2e08adb81644965ec86316b3fe1511f50d0c9887081d5487c581ade719d161606d53d5

    • C:\Windows\ntkrnlpa.exe

      Filesize

      360KB

      MD5

      732cdf0b27a32489411c9362859f7632

      SHA1

      2e72e9cd2782328ab35315c0875ff44947f53652

      SHA256

      8b8851878c1d9a6c5cf55348384e5dcb2fa441566be0e1a65f0cce43d84dedfa

      SHA512

      428accb2ad6b1c73b60d26dadbf6c399b5a2744eab1e45cebfd2d392a2d718449a25ca012a83ecc7c0f350819a7a42649b2b0e27ff55edc167d9ed85ec06a86d

    • C:\Windows\ntkrnlpa.exe

      Filesize

      360KB

      MD5

      732cdf0b27a32489411c9362859f7632

      SHA1

      2e72e9cd2782328ab35315c0875ff44947f53652

      SHA256

      8b8851878c1d9a6c5cf55348384e5dcb2fa441566be0e1a65f0cce43d84dedfa

      SHA512

      428accb2ad6b1c73b60d26dadbf6c399b5a2744eab1e45cebfd2d392a2d718449a25ca012a83ecc7c0f350819a7a42649b2b0e27ff55edc167d9ed85ec06a86d

    • memory/1180-135-0x0000000000000000-mapping.dmp

    • memory/4320-132-0x0000000000000000-mapping.dmp