Analysis

  • max time kernel
    214s
  • max time network
    248s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-02-2023 07:54

General

  • Target

    9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe

  • Size

    2.6MB

  • MD5

    934c49d59355222d86f973eb2d718f80

  • SHA1

    53e3d8dc0ae006a223685050f14727756800bb45

  • SHA256

    9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1

  • SHA512

    d08a18579b5fa0008e7bd11b840c5a83aea71c860a659d28f916cc56c0fb3952f0caaa3a419b464ea72a07c3ba35c993f8f4dc991a3931ff0680d351ae654cc3

  • SSDEEP

    49152:fqe3f6Rzn4NeTuiywMnNko/oejqVX5rIJwI2J5PiH7nBGtj:CSiRzn4NXnNkovjgJLTiH7BUj

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 9 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe
    "C:\Users\Admin\AppData\Local\Temp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Users\Admin\AppData\Local\Temp\is-OBAK5.tmp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-OBAK5.tmp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp" /SL5="$401D2,1888169,893952,C:\Users\Admin\AppData\Local\Temp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Users\Admin\AppData\Local\Temp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe
        "C:\Users\Admin\AppData\Local\Temp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe" /PDATA=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 /LAUNCHER /VERYSILENT
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3276
        • C:\Users\Admin\AppData\Local\Temp\is-RPM69.tmp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-RPM69.tmp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp" /SL5="$50204,1888169,893952,C:\Users\Admin\AppData\Local\Temp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe" /PDATA=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 /LAUNCHER /VERYSILENT
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:4892
          • C:\Users\Admin\AppData\Local\Temp\OneLaunch Setup_.exe
            "C:\Users\Admin\AppData\Local\Temp\OneLaunch Setup_.exe" /PDATA=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
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1528
            • C:\Users\Admin\AppData\Local\Temp\is-RL9SN.tmp\OneLaunch Setup_.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-RL9SN.tmp\OneLaunch Setup_.tmp" /SL5="$5019C,94007329,893952,C:\Users\Admin\AppData\Local\Temp\OneLaunch Setup_.exe" /PDATA=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
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:3352

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OneLaunch Setup.exe

    Filesize

    90.5MB

    MD5

    94c57e96e8a714d2e1b0693db17f4710

    SHA1

    ae2a38ef35bc4af08eba072aea9b3f16c0f1cb43

    SHA256

    08136c63d659df15296e2c10d7b3a12355e921025f0abd3f9ceb910da2bc44df

    SHA512

    0bdad6665672646e4da7a9f69bc7ffb88ad245d90e95a1e43e9009670ead7430d00c45301d89557a6afd5dafdf04d919013718adfa45c48251a4b99754c39fa3

  • C:\Users\Admin\AppData\Local\Temp\OneLaunch Setup_.exe

    Filesize

    90.5MB

    MD5

    94c57e96e8a714d2e1b0693db17f4710

    SHA1

    ae2a38ef35bc4af08eba072aea9b3f16c0f1cb43

    SHA256

    08136c63d659df15296e2c10d7b3a12355e921025f0abd3f9ceb910da2bc44df

    SHA512

    0bdad6665672646e4da7a9f69bc7ffb88ad245d90e95a1e43e9009670ead7430d00c45301d89557a6afd5dafdf04d919013718adfa45c48251a4b99754c39fa3

  • C:\Users\Admin\AppData\Local\Temp\is-7TJ24.tmp\Win32Library.dll

    Filesize

    45KB

    MD5

    5f4498860152be91f8f6b4ba36c61b99

    SHA1

    07a5b1a9c476d948568e2e3cf49a0efd489aa612

    SHA256

    7087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97

    SHA512

    ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4

  • C:\Users\Admin\AppData\Local\Temp\is-M0JSB.tmp\Win32Library.dll

    Filesize

    45KB

    MD5

    5f4498860152be91f8f6b4ba36c61b99

    SHA1

    07a5b1a9c476d948568e2e3cf49a0efd489aa612

    SHA256

    7087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97

    SHA512

    ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4

  • C:\Users\Admin\AppData\Local\Temp\is-M0JSB.tmp\Win32Library.dll

    Filesize

    45KB

    MD5

    5f4498860152be91f8f6b4ba36c61b99

    SHA1

    07a5b1a9c476d948568e2e3cf49a0efd489aa612

    SHA256

    7087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97

    SHA512

    ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4

  • C:\Users\Admin\AppData\Local\Temp\is-M0JSB.tmp\Win32Library.dll

    Filesize

    45KB

    MD5

    5f4498860152be91f8f6b4ba36c61b99

    SHA1

    07a5b1a9c476d948568e2e3cf49a0efd489aa612

    SHA256

    7087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97

    SHA512

    ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4

  • C:\Users\Admin\AppData\Local\Temp\is-O8NQ8.tmp\Win32Library.dll

    Filesize

    45KB

    MD5

    5f4498860152be91f8f6b4ba36c61b99

    SHA1

    07a5b1a9c476d948568e2e3cf49a0efd489aa612

    SHA256

    7087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97

    SHA512

    ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4

  • C:\Users\Admin\AppData\Local\Temp\is-O8NQ8.tmp\Win32Library.dll

    Filesize

    45KB

    MD5

    5f4498860152be91f8f6b4ba36c61b99

    SHA1

    07a5b1a9c476d948568e2e3cf49a0efd489aa612

    SHA256

    7087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97

    SHA512

    ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4

  • C:\Users\Admin\AppData\Local\Temp\is-O8NQ8.tmp\Win32Library.dll

    Filesize

    45KB

    MD5

    5f4498860152be91f8f6b4ba36c61b99

    SHA1

    07a5b1a9c476d948568e2e3cf49a0efd489aa612

    SHA256

    7087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97

    SHA512

    ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4

  • C:\Users\Admin\AppData\Local\Temp\is-OBAK5.tmp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp

    Filesize

    3.0MB

    MD5

    7e4d39aff96ee21f2c4b6fef0ed1e370

    SHA1

    8c4d12d12b992b3c3d96fb8a6e92f0518e4067c7

    SHA256

    247c55c901f10aa33749b41f5805e69c17e2cf65f4a0737a55809b7c20f65f96

    SHA512

    093ea64c3983370675b20ab937aa4720304b44f83cb67a09f6d0e8649783b4b464f2b5ab60e36f422cfc07fbfb20258a2e5e746f41f4505b595313e4d3a667fc

  • C:\Users\Admin\AppData\Local\Temp\is-RL9SN.tmp\OneLaunch Setup_.tmp

    Filesize

    3.0MB

    MD5

    007a67d52a97724f3eec3ab2e12742ac

    SHA1

    196442041f7e2595685de72b339eb8fddb22126b

    SHA256

    ebd3cd9303f09a920463a7f444a594b1f7d163790f83628d3f5d66d2471cd96d

    SHA512

    7936b9aa08e30eb74093d2dac0ccbe0bc7b23b094196aa71dbfc949a42de1f76cdb99418ccd624b541913281540577708e063930eb02b49a7a833f94024de34c

  • C:\Users\Admin\AppData\Local\Temp\is-RL9SN.tmp\OneLaunch Setup_.tmp

    Filesize

    3.0MB

    MD5

    007a67d52a97724f3eec3ab2e12742ac

    SHA1

    196442041f7e2595685de72b339eb8fddb22126b

    SHA256

    ebd3cd9303f09a920463a7f444a594b1f7d163790f83628d3f5d66d2471cd96d

    SHA512

    7936b9aa08e30eb74093d2dac0ccbe0bc7b23b094196aa71dbfc949a42de1f76cdb99418ccd624b541913281540577708e063930eb02b49a7a833f94024de34c

  • C:\Users\Admin\AppData\Local\Temp\is-RPM69.tmp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp

    Filesize

    3.0MB

    MD5

    7e4d39aff96ee21f2c4b6fef0ed1e370

    SHA1

    8c4d12d12b992b3c3d96fb8a6e92f0518e4067c7

    SHA256

    247c55c901f10aa33749b41f5805e69c17e2cf65f4a0737a55809b7c20f65f96

    SHA512

    093ea64c3983370675b20ab937aa4720304b44f83cb67a09f6d0e8649783b4b464f2b5ab60e36f422cfc07fbfb20258a2e5e746f41f4505b595313e4d3a667fc

  • memory/1528-164-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1528-159-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1528-157-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1528-155-0x0000000000000000-mapping.dmp

  • memory/3032-142-0x0000000008F70000-0x0000000009002000-memory.dmp

    Filesize

    584KB

  • memory/3032-143-0x0000000003790000-0x00000000038D0000-memory.dmp

    Filesize

    1.2MB

  • memory/3032-134-0x0000000000000000-mapping.dmp

  • memory/3032-141-0x0000000074090000-0x00000000740A4000-memory.dmp

    Filesize

    80KB

  • memory/3032-144-0x0000000003790000-0x00000000038D0000-memory.dmp

    Filesize

    1.2MB

  • memory/3032-146-0x0000000003790000-0x00000000038D0000-memory.dmp

    Filesize

    1.2MB

  • memory/3032-145-0x0000000003790000-0x00000000038D0000-memory.dmp

    Filesize

    1.2MB

  • memory/3276-147-0x0000000000000000-mapping.dmp

  • memory/3276-153-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/3276-148-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/3352-160-0x0000000000000000-mapping.dmp

  • memory/3352-165-0x0000000002E60000-0x0000000002FA0000-memory.dmp

    Filesize

    1.2MB

  • memory/3352-166-0x0000000002E60000-0x0000000002FA0000-memory.dmp

    Filesize

    1.2MB

  • memory/3352-169-0x000000006F700000-0x000000006F714000-memory.dmp

    Filesize

    80KB

  • memory/4092-132-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/4092-138-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/4092-136-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/4092-170-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/4892-150-0x0000000000000000-mapping.dmp