Analysis

  • max time kernel
    600s
  • max time network
    601s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2023 11:23

General

  • Target

    Specification.exe

  • Size

    295KB

  • MD5

    6c4166241e9dd7e55249cf4d9dedba3a

  • SHA1

    a052f58f9a348cf693d80c6831dfc885baec23ef

  • SHA256

    2cbadf3f08bde65e99a75e12eb5a7eba6290bb6159a9850001b5a0f90b289c0e

  • SHA512

    4fe962dcaf993fc39cb9538d05a0433f968ad642c96df7f38aac0051afd2bbf210b306dc4b838673c9ad65dcdde42f724e183ee2cc6e75afd983b78eda5d23b7

  • SSDEEP

    6144:PYa69oq/ZRMDmB5n7E+gf7U0FNbWE+z9T87vjV3oQ5eqP+p8c26M:PYfo8ZODmHgbo0FgEiJ8B3oQ5eqP+pKN

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:600
    • C:\Users\Admin\AppData\Local\Temp\Specification.exe
      "C:\Users\Admin\AppData\Local\Temp\Specification.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Users\Admin\AppData\Local\Temp\tvjkel.exe
        "C:\Users\Admin\AppData\Local\Temp\tvjkel.exe" C:\Users\Admin\AppData\Local\Temp\mctzftild.g
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1664
        • C:\Users\Admin\AppData\Local\Temp\tvjkel.exe
          "C:\Users\Admin\AppData\Local\Temp\tvjkel.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4248
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:1020
      • C:\Windows\SysWOW64\cmmon32.exe
        "C:\Windows\SysWOW64\cmmon32.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:2200
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2200 -s 200
              4⤵
              • Program crash
              PID:4532
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 456 -p 2200 -ip 2200
        1⤵
          PID:4768

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lplasygsf.ysb

          Filesize

          205KB

          MD5

          6f8d0a6210134e21cb2a9bdf3dd07217

          SHA1

          6af61771f92d3ea7ddeef0151202f44fa9eb67a8

          SHA256

          793a48ce824dc6547c37f5079ee989febb5079f5682ece6d6305966d4cc3a67b

          SHA512

          c9a140fc522ef82db93cafc728e0d8c45530b6c2ac3166447548ef8267b0e69e1bc46ce86c5c67fef03cdc56bd3b963fceb7d67eac2a34564a3942d592b38959

        • C:\Users\Admin\AppData\Local\Temp\mctzftild.g

          Filesize

          5KB

          MD5

          a156959c4196968969edf33fa299053d

          SHA1

          64c987d8a657eb99aa78ecb77d4fac6f1732110d

          SHA256

          1e96299e2b0c7f446214497c0bc9926c4ad8ac8b2a1555c5c3b08cc57f427507

          SHA512

          3cfb6d230ddf431f6dfc6bc493a02f9514f76528d7d3bd6ada23647b81677f46224f5af361868de624ee73bb2079c62cbdf855c66c8df2d0ef8795377f369de7

        • C:\Users\Admin\AppData\Local\Temp\tvjkel.exe

          Filesize

          101KB

          MD5

          47f16d991abe4a7ca791e761f473d7d8

          SHA1

          12b35684609eb4b63c989e10cc2edbf099bc777e

          SHA256

          2b4525be8957377a3352564c4007397f53e2d0c2c0016a1593422c422376cb52

          SHA512

          1eb8221e700fdc81fd3a5b7071fb1b2de0ee0cd291ef98e34761f32f33a227eea12fea68d2ea9d9888887865629bf0a12cc6f586e922eeeddd89fe369c2af02e

        • C:\Users\Admin\AppData\Local\Temp\tvjkel.exe

          Filesize

          101KB

          MD5

          47f16d991abe4a7ca791e761f473d7d8

          SHA1

          12b35684609eb4b63c989e10cc2edbf099bc777e

          SHA256

          2b4525be8957377a3352564c4007397f53e2d0c2c0016a1593422c422376cb52

          SHA512

          1eb8221e700fdc81fd3a5b7071fb1b2de0ee0cd291ef98e34761f32f33a227eea12fea68d2ea9d9888887865629bf0a12cc6f586e922eeeddd89fe369c2af02e

        • C:\Users\Admin\AppData\Local\Temp\tvjkel.exe

          Filesize

          101KB

          MD5

          47f16d991abe4a7ca791e761f473d7d8

          SHA1

          12b35684609eb4b63c989e10cc2edbf099bc777e

          SHA256

          2b4525be8957377a3352564c4007397f53e2d0c2c0016a1593422c422376cb52

          SHA512

          1eb8221e700fdc81fd3a5b7071fb1b2de0ee0cd291ef98e34761f32f33a227eea12fea68d2ea9d9888887865629bf0a12cc6f586e922eeeddd89fe369c2af02e

        • memory/600-142-0x00000000086E0000-0x00000000087EB000-memory.dmp

          Filesize

          1.0MB

        • memory/600-150-0x0000000003450000-0x0000000003548000-memory.dmp

          Filesize

          992KB

        • memory/600-149-0x0000000003450000-0x0000000003548000-memory.dmp

          Filesize

          992KB

        • memory/4248-140-0x0000000001200000-0x000000000154A000-memory.dmp

          Filesize

          3.3MB

        • memory/4248-141-0x00000000008A0000-0x00000000008B0000-memory.dmp

          Filesize

          64KB

        • memory/4248-144-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4248-139-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4516-145-0x0000000000590000-0x000000000059C000-memory.dmp

          Filesize

          48KB

        • memory/4516-146-0x0000000002ED0000-0x000000000321A000-memory.dmp

          Filesize

          3.3MB

        • memory/4516-147-0x0000000000EC0000-0x0000000000EED000-memory.dmp

          Filesize

          180KB

        • memory/4516-148-0x0000000002C00000-0x0000000002C8F000-memory.dmp

          Filesize

          572KB