Analysis

  • max time kernel
    102s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2023, 07:05

General

  • Target

    70fd4f566c140832aacc24286781be09255ff7ecec593e04e5c65fc6bec4ac7b.exe

  • Size

    1.4MB

  • MD5

    f7d900047b5b2fcd8e25a6db46a0fb5f

  • SHA1

    07a9dbbf89b6f1801888aee355a23f5548fa658b

  • SHA256

    70fd4f566c140832aacc24286781be09255ff7ecec593e04e5c65fc6bec4ac7b

  • SHA512

    5549014afaeb51200f97704d66de2792bc445a1b5f2df0335ed98c9890e060dd415baccb8f1af7b854cbfbd7a0ee8540f61bef448302209363d5cb77e9ae5faa

  • SSDEEP

    24576:WiIy60hvWIUiQjUo7SmQ0GsKlis+5d/zhgqcLhYJtDBbQSzq9gc8E8U5XMH2w9:mbSmksKlisAd/F5ciPD09efUs2E

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70fd4f566c140832aacc24286781be09255ff7ecec593e04e5c65fc6bec4ac7b.exe
    "C:\Users\Admin\AppData\Local\Temp\70fd4f566c140832aacc24286781be09255ff7ecec593e04e5c65fc6bec4ac7b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -u dQZE.D6W -s
      2⤵
      • Loads dropped DLL
      PID:5088

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dQZE.D6W

    Filesize

    1.4MB

    MD5

    3f500e114ad575a4fe55701da18f0ef3

    SHA1

    15b64d562c26f4a05cadaf255fcd8dfa5806fd1d

    SHA256

    0c1d537333e4c359578b69090f4d446eb4a6f477cae33d8799e721b2c3ea1293

    SHA512

    bafcbc6c56e44b23d2ad06b6fff043594bc1d12cada4ff479b0824fbbcee30d72634ff2b99f90537d0c2347e191c6ccd213c4e3730f8c86d420d2a08f2f67e66

  • C:\Users\Admin\AppData\Local\Temp\dQZe.D6W

    Filesize

    1.4MB

    MD5

    3f500e114ad575a4fe55701da18f0ef3

    SHA1

    15b64d562c26f4a05cadaf255fcd8dfa5806fd1d

    SHA256

    0c1d537333e4c359578b69090f4d446eb4a6f477cae33d8799e721b2c3ea1293

    SHA512

    bafcbc6c56e44b23d2ad06b6fff043594bc1d12cada4ff479b0824fbbcee30d72634ff2b99f90537d0c2347e191c6ccd213c4e3730f8c86d420d2a08f2f67e66

  • C:\Users\Admin\AppData\Local\Temp\dQZe.D6W

    Filesize

    1.4MB

    MD5

    3f500e114ad575a4fe55701da18f0ef3

    SHA1

    15b64d562c26f4a05cadaf255fcd8dfa5806fd1d

    SHA256

    0c1d537333e4c359578b69090f4d446eb4a6f477cae33d8799e721b2c3ea1293

    SHA512

    bafcbc6c56e44b23d2ad06b6fff043594bc1d12cada4ff479b0824fbbcee30d72634ff2b99f90537d0c2347e191c6ccd213c4e3730f8c86d420d2a08f2f67e66

  • memory/5088-136-0x0000000002090000-0x0000000002203000-memory.dmp

    Filesize

    1.4MB

  • memory/5088-137-0x0000000002090000-0x0000000002203000-memory.dmp

    Filesize

    1.4MB

  • memory/5088-140-0x0000000000510000-0x0000000000516000-memory.dmp

    Filesize

    24KB

  • memory/5088-141-0x0000000002410000-0x00000000024F5000-memory.dmp

    Filesize

    916KB

  • memory/5088-142-0x0000000002500000-0x00000000025CF000-memory.dmp

    Filesize

    828KB

  • memory/5088-143-0x0000000002500000-0x00000000025CF000-memory.dmp

    Filesize

    828KB