Analysis

  • max time kernel
    110s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 16:51

General

  • Target

    8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe

  • Size

    847KB

  • MD5

    2e72250ee937d3edb8dc9172454e6c40

  • SHA1

    2f03af41bcc1a38efe05d0b76f7a30a92dd8cc6b

  • SHA256

    8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95

  • SHA512

    e240f7fa81fbe7d4771cc45aeb049de2f909ad8beaa77440e55187f399fa420bddbc12ae7601227c3ee86e9946c91608e497e09e79720719132883a0eb47d2be

  • SSDEEP

    12288:PgvzTFzNZOO8GFmM7/8sYHKCi0rVbv3BdS0y4C8dYb9h5waJ5YHuhVH:iHMO8qmM7/vH4/BdS0y4C8dYD57JWOfH

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe
    "C:\Users\Admin\AppData\Local\Temp\8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe.doc" /o ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4976

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe.doc

          Filesize

          11KB

          MD5

          1ce82e18db835054f8a7dd2624e12236

          SHA1

          0463fc1e58252bd697dcfde517e3c4cc78e45e55

          SHA256

          f6344c54a786448d11ea3fd2600597a8cbb0bc8d0b6f3ea3ca5ce63100cdc9c1

          SHA512

          4e9129fca7a18b4f42340ae9d9369f844e0890877e1f93894197087f47f956c5c9046b637e1966de7abf6207ec0143b75b47b45737329ea196501a9a4ec94345

        • memory/4976-138-0x00007FFD92AA0000-0x00007FFD92AB0000-memory.dmp

          Filesize

          64KB

        • memory/4976-134-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

          Filesize

          64KB

        • memory/4976-135-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

          Filesize

          64KB

        • memory/4976-136-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

          Filesize

          64KB

        • memory/4976-137-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

          Filesize

          64KB

        • memory/4976-139-0x00007FFD92AA0000-0x00007FFD92AB0000-memory.dmp

          Filesize

          64KB

        • memory/4976-133-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

          Filesize

          64KB

        • memory/4976-143-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

          Filesize

          64KB

        • memory/4976-142-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

          Filesize

          64KB

        • memory/4976-144-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

          Filesize

          64KB

        • memory/4976-145-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

          Filesize

          64KB