Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-03-2023 08:13

General

  • Target

    77a8f55f8d23e0d7f0b816e2433f4c8cd0f6f8bd5b954f8a4b0b5b6ed560b3e4.exe

  • Size

    1.4MB

  • MD5

    c9bac05e33c3be03dee25a062ac40a55

  • SHA1

    8e23195dc420793092eb17201810e8a522065c52

  • SHA256

    77a8f55f8d23e0d7f0b816e2433f4c8cd0f6f8bd5b954f8a4b0b5b6ed560b3e4

  • SHA512

    388c5ba9530e5216cdf3639555389fbfa4f0ee8def369d29d876351c95d852bed28b8e9fe52cab4a8df90efc3a73edc128b84db53dd1a7aec4469594cf35fc12

  • SSDEEP

    24576:gqLLdb+QD1dK+a5rprVe/tfA+zTQipSgMnTJm0ImIQXk1RkEHDDfZ+hXVg60BlU+:HLdb9D1dKHU17HpSlTJ9ImIck7VHXfZp

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77a8f55f8d23e0d7f0b816e2433f4c8cd0f6f8bd5b954f8a4b0b5b6ed560b3e4.exe
    "C:\Users\Admin\AppData\Local\Temp\77a8f55f8d23e0d7f0b816e2433f4c8cd0f6f8bd5b954f8a4b0b5b6ed560b3e4.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VistaTcpOpen.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Windows\SysWOW64\netsh.exe
        netsh int tcp set global autotuninglevel=disable
        3⤵
          PID:2296
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 2164
        2⤵
        • Program crash
        PID:4424
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1528 -ip 1528
      1⤵
        PID:5076

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\VistaTcpOpen.bat
        Filesize

        50B

        MD5

        bce66c36a8152279a15d3a9bde66cb41

        SHA1

        a2df532be03fb049829ad7e0a9658f41663f07d9

        SHA256

        a0c9a1753c6459da695ffab12a8a4922566a664a1063f22c453313afe2bfddc5

        SHA512

        95d1d55c424de373c0e148c4ea98f62d0a7cd287bf166d3de1a1893aa2e89e473dcdee1e081c7501269ba0d690c6a0e0d148a59a825ec40c6294117da8a727ca

      • memory/1528-136-0x0000000009E40000-0x0000000009E41000-memory.dmp
        Filesize

        4KB

      • memory/1528-137-0x000000000F440000-0x000000000F441000-memory.dmp
        Filesize

        4KB

      • memory/1528-138-0x000000000FB60000-0x000000000FB61000-memory.dmp
        Filesize

        4KB

      • memory/1528-139-0x000000000FB80000-0x000000000FB81000-memory.dmp
        Filesize

        4KB

      • memory/1528-186-0x0000000000400000-0x0000000001400000-memory.dmp
        Filesize

        16.0MB

      • memory/1528-187-0x0000000009E40000-0x0000000009E41000-memory.dmp
        Filesize

        4KB

      • memory/1528-188-0x000000000F440000-0x000000000F441000-memory.dmp
        Filesize

        4KB

      • memory/1528-189-0x000000000FB60000-0x000000000FB61000-memory.dmp
        Filesize

        4KB

      • memory/1528-190-0x000000000FB80000-0x000000000FB81000-memory.dmp
        Filesize

        4KB