Analysis

  • max time kernel
    187s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/12/2022, 02:20

General

  • Target

    26835efacef89e0eabb42d429968d42c477d2595a7484a59f2f1e086664f1566.exe

  • Size

    1.9MB

  • MD5

    2ee47d33a69035ada2eb186989a3f6aa

  • SHA1

    3fd077bf8bb3438bd116b3527fabab75d79cc13e

  • SHA256

    26835efacef89e0eabb42d429968d42c477d2595a7484a59f2f1e086664f1566

  • SHA512

    5f90808d24d1efd08b9987e81fc4088f110dcca435553478009e5b52513806c1aa408bceae11bd592d8d1cae43eaff6f5c2e35c58d20f5c3051f092e6fa9c0de

  • SSDEEP

    49152:C3dd05L004tAvPX5f2e8BAf45kFVCqBH4xSqn/eATdkxE:CM5L004CX5Ob+J6qBH4xSq/eAT6m

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26835efacef89e0eabb42d429968d42c477d2595a7484a59f2f1e086664f1566.exe
    "C:\Users\Admin\AppData\Local\Temp\26835efacef89e0eabb42d429968d42c477d2595a7484a59f2f1e086664f1566.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" -y .\DAQRFEEI.GYW
      2⤵
      • Loads dropped DLL
      PID:2284

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DAQRFEEI.GYW

          Filesize

          2.7MB

          MD5

          12cddf900e1cb001c69874072717233e

          SHA1

          29935b0baa0d38b15601aab1746e56fb6d83f58e

          SHA256

          762435f961f5ab7b78f46b10baa4c56d74765b23832eb769f36a908669ae5371

          SHA512

          1de5a924359da9895d45948f300b273244dff05e26007795daa65bb9c44b64ed12bda2a7af28e9537b37c3f1ea6d283b8d2dc24761e8b9e99d91eda399bfed21

        • C:\Users\Admin\AppData\Local\Temp\DaQrfeEI.GyW

          Filesize

          2.7MB

          MD5

          12cddf900e1cb001c69874072717233e

          SHA1

          29935b0baa0d38b15601aab1746e56fb6d83f58e

          SHA256

          762435f961f5ab7b78f46b10baa4c56d74765b23832eb769f36a908669ae5371

          SHA512

          1de5a924359da9895d45948f300b273244dff05e26007795daa65bb9c44b64ed12bda2a7af28e9537b37c3f1ea6d283b8d2dc24761e8b9e99d91eda399bfed21

        • C:\Users\Admin\AppData\Local\Temp\DaQrfeEI.GyW

          Filesize

          2.7MB

          MD5

          12cddf900e1cb001c69874072717233e

          SHA1

          29935b0baa0d38b15601aab1746e56fb6d83f58e

          SHA256

          762435f961f5ab7b78f46b10baa4c56d74765b23832eb769f36a908669ae5371

          SHA512

          1de5a924359da9895d45948f300b273244dff05e26007795daa65bb9c44b64ed12bda2a7af28e9537b37c3f1ea6d283b8d2dc24761e8b9e99d91eda399bfed21

        • memory/2284-136-0x0000000002AE0000-0x0000000002DA2000-memory.dmp

          Filesize

          2.8MB

        • memory/2284-137-0x0000000003030000-0x00000000032A4000-memory.dmp

          Filesize

          2.5MB

        • memory/2284-138-0x00000000033E0000-0x0000000003510000-memory.dmp

          Filesize

          1.2MB

        • memory/2284-139-0x0000000003510000-0x00000000035EF000-memory.dmp

          Filesize

          892KB

        • memory/2284-140-0x00000000035F0000-0x00000000036B9000-memory.dmp

          Filesize

          804KB

        • memory/2284-143-0x00000000033E0000-0x0000000003510000-memory.dmp

          Filesize

          1.2MB