Analysis

  • max time kernel
    85s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2023, 22:50

General

  • Target

    tmp786A.tmp.exe

  • Size

    2.7MB

  • MD5

    e0a5c7191e00ea683c4e73b1c80b8823

  • SHA1

    8349e708101ba87a868fcf7cb4d00b91f1620ff6

  • SHA256

    95dd221630d172703a90842a31b0e25a97f98c236e7a4cc09e5dc5862d8d0370

  • SHA512

    1f2c10f8205952f613f406d7ea1c4d4bcdf6c71286ca4db859e3a131b4ee30af86f0e35cbcd58e3cd2d8f05a7e4a5be4dede910980b0afbfc44b7fea4d9224fa

  • SSDEEP

    49152:QeTuAoMnEHz/oiGhEjE0rzsK+/pWOjrz7Tt5CuU7LHkeimyVfC:Qcu+ozq6sK+sOjrKLH7Z

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1672
    • C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe
      C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tmp786A.tmp.exe.log

    Filesize

    1KB

    MD5

    2bea5ace75c1c406471930d05acf41f1

    SHA1

    fb20b843c1bf0340d17793752b9bca1e2e0333ba

    SHA256

    56036effd69e1a8cf8f77bb8acfee51f312865979e734638a2ad8f089d078d73

    SHA512

    86a8af16f5ff8436418bddb4ff59211c770353416ef262bad0a36b2b5afa1ab766c63fd93a5d02c323c0504e10bbff43d5ff6cadc01739f64e135a6a9b388b1c

  • memory/860-132-0x0000000000D70000-0x0000000001024000-memory.dmp

    Filesize

    2.7MB

  • memory/860-133-0x0000000005DE0000-0x0000000005E02000-memory.dmp

    Filesize

    136KB

  • memory/860-143-0x00000000075E0000-0x0000000007B84000-memory.dmp

    Filesize

    5.6MB

  • memory/860-142-0x0000000006530000-0x00000000065C2000-memory.dmp

    Filesize

    584KB

  • memory/1672-138-0x00000000058E0000-0x0000000005946000-memory.dmp

    Filesize

    408KB

  • memory/1672-137-0x0000000005800000-0x0000000005866000-memory.dmp

    Filesize

    408KB

  • memory/1672-139-0x0000000005F00000-0x0000000005F1E000-memory.dmp

    Filesize

    120KB

  • memory/1672-140-0x0000000007530000-0x0000000007BAA000-memory.dmp

    Filesize

    6.5MB

  • memory/1672-141-0x0000000006400000-0x000000000641A000-memory.dmp

    Filesize

    104KB

  • memory/1672-136-0x00000000051D0000-0x00000000057F8000-memory.dmp

    Filesize

    6.2MB

  • memory/1672-135-0x00000000025B0000-0x00000000025E6000-memory.dmp

    Filesize

    216KB

  • memory/3192-145-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB