Analysis

  • max time kernel
    94s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 16:28

General

  • Target

    d2e1199c7ed7260ffb0bd5b16bdbd0b54d8d72313932f6f52e19d4155b613e66.exe

  • Size

    884KB

  • MD5

    3cd7d390038e26560ea16c703f2463bc

  • SHA1

    540d2ab5323d8d8b991a0a725390a92fa97c50e2

  • SHA256

    d2e1199c7ed7260ffb0bd5b16bdbd0b54d8d72313932f6f52e19d4155b613e66

  • SHA512

    38bc41d07c3a1b564b0118cef45514a113c5c0893369b9870ed16ff4dc7f01170ea82deafacd753070a618f21d6140d4af0df156e20dc56f3e6d9e5edd5cb8bc

  • SSDEEP

    24576:pQGQo8na9O5udb/rYi0qoYPSupiA0UyQeBJdHiQzm:Br8abZUXa1IUyQiiQK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2e1199c7ed7260ffb0bd5b16bdbd0b54d8d72313932f6f52e19d4155b613e66.exe
    "C:\Users\Admin\AppData\Local\Temp\d2e1199c7ed7260ffb0bd5b16bdbd0b54d8d72313932f6f52e19d4155b613e66.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:488
    • C:\Users\Admin\AppData\Local\hkcmd.exe
      "C:\Users\Admin\AppData\Local\hkcmd.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:5072
    • C:\Users\Admin\AppData\Local\pB0T.exe
      "C:\Users\Admin\AppData\Local\pB0T.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1904
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s tabctl32.ocx
        3⤵
          PID:2112

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\hkcmd.exe

      Filesize

      884KB

      MD5

      3cd7d390038e26560ea16c703f2463bc

      SHA1

      540d2ab5323d8d8b991a0a725390a92fa97c50e2

      SHA256

      d2e1199c7ed7260ffb0bd5b16bdbd0b54d8d72313932f6f52e19d4155b613e66

      SHA512

      38bc41d07c3a1b564b0118cef45514a113c5c0893369b9870ed16ff4dc7f01170ea82deafacd753070a618f21d6140d4af0df156e20dc56f3e6d9e5edd5cb8bc

    • C:\Users\Admin\AppData\Local\hkcmd.exe

      Filesize

      884KB

      MD5

      3cd7d390038e26560ea16c703f2463bc

      SHA1

      540d2ab5323d8d8b991a0a725390a92fa97c50e2

      SHA256

      d2e1199c7ed7260ffb0bd5b16bdbd0b54d8d72313932f6f52e19d4155b613e66

      SHA512

      38bc41d07c3a1b564b0118cef45514a113c5c0893369b9870ed16ff4dc7f01170ea82deafacd753070a618f21d6140d4af0df156e20dc56f3e6d9e5edd5cb8bc

    • C:\Users\Admin\AppData\Local\pB0T.exe

      Filesize

      170KB

      MD5

      1d8c078e0d13ae042ffb7d878b392bfe

      SHA1

      6ca7010394f928024346cf545d8ecff63a2abcf4

      SHA256

      135b36087cbf16efa198264dd7ea07afa9c80363b1ff8d93d87dd756f8ff763f

      SHA512

      4ca8987592aca43a6d9b6fd7e50c43d2c8bc4382726355462d700e6dc3e61c1dbaa53651e39cd8a8515996e22a507ddd268489c6f15f1cff9b2e2a85e57956d4

    • C:\Users\Admin\AppData\Local\pB0T.exe

      Filesize

      170KB

      MD5

      1d8c078e0d13ae042ffb7d878b392bfe

      SHA1

      6ca7010394f928024346cf545d8ecff63a2abcf4

      SHA256

      135b36087cbf16efa198264dd7ea07afa9c80363b1ff8d93d87dd756f8ff763f

      SHA512

      4ca8987592aca43a6d9b6fd7e50c43d2c8bc4382726355462d700e6dc3e61c1dbaa53651e39cd8a8515996e22a507ddd268489c6f15f1cff9b2e2a85e57956d4

    • memory/1904-165-0x0000000000400000-0x00000000004E6000-memory.dmp

      Filesize

      920KB

    • memory/1904-163-0x0000000000400000-0x00000000004E6000-memory.dmp

      Filesize

      920KB

    • memory/5072-148-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-152-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-143-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-144-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-145-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-146-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-147-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-150-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-149-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-151-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-142-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-156-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-155-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-154-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-153-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-157-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-140-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-141-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-139-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-137-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-136-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-133-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/5072-166-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB