Analysis

  • max time kernel
    260s
  • max time network
    284s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/12/2022, 01:08

General

  • Target

    9b2635edf1c36d047d4e329e64a88a7dcc29388cde4dbcb6368250d8121acc40.exe

  • Size

    95KB

  • MD5

    df3ec92677369fe4ab0dcafb76c60de7

  • SHA1

    eea2b568658fe4d67d334cc3e2de7d9b13f6f671

  • SHA256

    9b2635edf1c36d047d4e329e64a88a7dcc29388cde4dbcb6368250d8121acc40

  • SHA512

    290da0a1708a689c5e1312f830b8f29d9d5299a1ecbb6e39c0b56bba563ad43d7b5f1db5edcb2e617cbfbc08d9f7e677315e578f2fd2a95599f1ccb24f8c7e81

  • SSDEEP

    1536:YT3KuCzqahhTbcG0yZnFi0Seu9+2aLWdaAQzqj3D7QpHoSp7wpvFIy:1c0S/9wCdaxzqj3DEeSCpvFIy

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b2635edf1c36d047d4e329e64a88a7dcc29388cde4dbcb6368250d8121acc40.exe
    "C:\Users\Admin\AppData\Local\Temp\9b2635edf1c36d047d4e329e64a88a7dcc29388cde4dbcb6368250d8121acc40.exe"
    1⤵
    • Checks computer location settings
    PID:3812

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3812-132-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB