Analysis

  • max time kernel
    90s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2022 06:40

General

  • Target

    a6989812c635027773f68f24859e9a93cb282fb2cc47848cc229f4bfeff9b1b7.exe

  • Size

    1.5MB

  • MD5

    2b0cd508f803c8a0cb57a925d820f8c7

  • SHA1

    130990925fd68f6904680779b8f4eb2b2f906fda

  • SHA256

    a6989812c635027773f68f24859e9a93cb282fb2cc47848cc229f4bfeff9b1b7

  • SHA512

    c3ee6c17cd24e868ff7929ab5ce4361f05634d46229b92d701840bf67ac265149f66d6cab1cb0e989d835d9df84d73b033eafa27efbf1815977c83abc7447a2b

  • SSDEEP

    24576:VJr8tEZgHqUo5XJs3Qb8DOQn+qQX8AAVJTM4JdrcqA8znRIQBgvGv/46XPJF:VJ4oz5XJsAb8DOQnXQDAVJw4YATaQoGb

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6989812c635027773f68f24859e9a93cb282fb2cc47848cc229f4bfeff9b1b7.exe
    "C:\Users\Admin\AppData\Local\Temp\a6989812c635027773f68f24859e9a93cb282fb2cc47848cc229f4bfeff9b1b7.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /y .\3_T_8J.uQ
      2⤵
      • Loads dropped DLL
      PID:520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3_T_8J.uQ

    Filesize

    1.3MB

    MD5

    67c8b9393916c41c30d1d4a5cce6798e

    SHA1

    484e2003e8c7a63e32d2b05e17c776c872c9a145

    SHA256

    b89b719b845d666ac66ff84405c66d94d320780c106af3a406cd003bc5ba5fb9

    SHA512

    31d938c6877e99f22af2d47fca144e789a867cbc82a5211b29c57a3bc13e5a820546fd4f7181d879baef35711c5434f882b6a5c126b2e3237c9102af06e7f176

  • C:\Users\Admin\AppData\Local\Temp\3_T_8J.uq

    Filesize

    1.3MB

    MD5

    67c8b9393916c41c30d1d4a5cce6798e

    SHA1

    484e2003e8c7a63e32d2b05e17c776c872c9a145

    SHA256

    b89b719b845d666ac66ff84405c66d94d320780c106af3a406cd003bc5ba5fb9

    SHA512

    31d938c6877e99f22af2d47fca144e789a867cbc82a5211b29c57a3bc13e5a820546fd4f7181d879baef35711c5434f882b6a5c126b2e3237c9102af06e7f176

  • memory/520-132-0x0000000000000000-mapping.dmp

  • memory/520-135-0x0000000003270000-0x000000000339A000-memory.dmp

    Filesize

    1.2MB

  • memory/520-136-0x00000000034D0000-0x00000000035F6000-memory.dmp

    Filesize

    1.1MB

  • memory/520-137-0x0000000003600000-0x00000000036E1000-memory.dmp

    Filesize

    900KB

  • memory/520-138-0x00000000036F0000-0x00000000037BB000-memory.dmp

    Filesize

    812KB

  • memory/520-141-0x00000000034D0000-0x00000000035F6000-memory.dmp

    Filesize

    1.1MB