Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2023, 04:42

General

  • Target

    345aac6d9dc8c3fc9994f4d57ad8d9d19b084eb5dccfbe791e80abd837bfcc70.exe

  • Size

    1.6MB

  • MD5

    e57db10f538de3f3f972b2414ab65739

  • SHA1

    a6ff181ca93bc4815b5f22bd22af840e08558cce

  • SHA256

    345aac6d9dc8c3fc9994f4d57ad8d9d19b084eb5dccfbe791e80abd837bfcc70

  • SHA512

    abff51bb64d929629b82a6908b55c57227b3d685c2851d4883c5bf276be348755461ca773741b85dfa5b5f1fe8b894e24eecae7a86b9c7bcc0ec48bb14046ef6

  • SSDEEP

    24576:rconAINPy/CQ9U5/cg6rv04sgql/cT/5fbMHo5d08xTWvPnPN5sMTXqvKEyH:bRxzt0M4sB/czxMHUKETwPH26

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\345aac6d9dc8c3fc9994f4d57ad8d9d19b084eb5dccfbe791e80abd837bfcc70.exe
    "C:\Users\Admin\AppData\Local\Temp\345aac6d9dc8c3fc9994f4d57ad8d9d19b084eb5dccfbe791e80abd837bfcc70.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" -y .\VXKUcMAO.MY
      2⤵
      • Loads dropped DLL
      PID:744

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\VXKUcMAO.MY

          Filesize

          1.1MB

          MD5

          061ca9ac83227433048551c8ba1c5e87

          SHA1

          c4b62c624b382f7387ee4ab9f99df7701de80bef

          SHA256

          57a722c79045580fe0e1640c87bcfb41f377b91a438613ac13c259f4ced24606

          SHA512

          10a2d3ce97a4e63285e551d3ed1f35fd6689c2f50964ce074301cdbcc56313800a210b556fd62a84bdf621bee87f0eef093007e56b5afd294ee43f56ee0f0696

        • C:\Users\Admin\AppData\Local\Temp\VXKUcmaO.mY

          Filesize

          1.1MB

          MD5

          061ca9ac83227433048551c8ba1c5e87

          SHA1

          c4b62c624b382f7387ee4ab9f99df7701de80bef

          SHA256

          57a722c79045580fe0e1640c87bcfb41f377b91a438613ac13c259f4ced24606

          SHA512

          10a2d3ce97a4e63285e551d3ed1f35fd6689c2f50964ce074301cdbcc56313800a210b556fd62a84bdf621bee87f0eef093007e56b5afd294ee43f56ee0f0696

        • C:\Users\Admin\AppData\Local\Temp\VXKUcmaO.mY

          Filesize

          1.1MB

          MD5

          061ca9ac83227433048551c8ba1c5e87

          SHA1

          c4b62c624b382f7387ee4ab9f99df7701de80bef

          SHA256

          57a722c79045580fe0e1640c87bcfb41f377b91a438613ac13c259f4ced24606

          SHA512

          10a2d3ce97a4e63285e551d3ed1f35fd6689c2f50964ce074301cdbcc56313800a210b556fd62a84bdf621bee87f0eef093007e56b5afd294ee43f56ee0f0696

        • memory/744-138-0x00000000022F0000-0x0000000002401000-memory.dmp

          Filesize

          1.1MB

        • memory/744-139-0x00000000022F0000-0x0000000002401000-memory.dmp

          Filesize

          1.1MB

        • memory/744-141-0x0000000000580000-0x0000000000586000-memory.dmp

          Filesize

          24KB

        • memory/744-142-0x00000000026A0000-0x0000000002780000-memory.dmp

          Filesize

          896KB

        • memory/744-143-0x0000000002780000-0x0000000002848000-memory.dmp

          Filesize

          800KB

        • memory/744-146-0x0000000002780000-0x0000000002848000-memory.dmp

          Filesize

          800KB

        • memory/744-147-0x0000000002780000-0x0000000002848000-memory.dmp

          Filesize

          800KB