Analysis

  • max time kernel
    114s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-03-2023 17:28

General

  • Target

    c92aa831ce9aea1b3400487acb615cd405fff383089af3428397a7b741c247ac.exe

  • Size

    1.3MB

  • MD5

    d6e0e6ed1d8e02102c7a1aa6ba3ed31e

  • SHA1

    ad98e87f17e586b590972ac9fe9452374ce6692f

  • SHA256

    c92aa831ce9aea1b3400487acb615cd405fff383089af3428397a7b741c247ac

  • SHA512

    cab5933e61784c84bc9f0e780b9a0f2900ed89e49ce5d06feee97fdf397e80a81884aa85c019c4f2e01c22a858eb721724faf31629918de549d9214c304e669c

  • SSDEEP

    24576:pLllLl7CEtivQD1CtrWUgi8nENVm55A3idJ8m0pCRg3182Ua+M:BllLteQJyHrmzA36J87H82UA

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c92aa831ce9aea1b3400487acb615cd405fff383089af3428397a7b741c247ac.exe
    "C:\Users\Admin\AppData\Local\Temp\c92aa831ce9aea1b3400487acb615cd405fff383089af3428397a7b741c247ac.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" .\7NzQeTEU.Vum -s
      2⤵
      • Loads dropped DLL
      PID:4248

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7NzQeTEU.Vum

    Filesize

    1.1MB

    MD5

    e1b8504dae850187903afcc6910c6f8f

    SHA1

    66030f2e6cb1710d218b3096d42350c948145a2d

    SHA256

    66f683fee49f19540024a469bcfc83fa008862b781810b13a17690a183ecc850

    SHA512

    54c7091289a8eb65acfc3666bbe7ba307a9e78ccc92018ba831f839cca9668435d1c497952fd49cfc5f68c9b144b5d7ac22c7e73fa1929d349d8ad021950498f

  • C:\Users\Admin\AppData\Local\Temp\7nzQeTeU.vum

    Filesize

    1.1MB

    MD5

    e1b8504dae850187903afcc6910c6f8f

    SHA1

    66030f2e6cb1710d218b3096d42350c948145a2d

    SHA256

    66f683fee49f19540024a469bcfc83fa008862b781810b13a17690a183ecc850

    SHA512

    54c7091289a8eb65acfc3666bbe7ba307a9e78ccc92018ba831f839cca9668435d1c497952fd49cfc5f68c9b144b5d7ac22c7e73fa1929d349d8ad021950498f

  • C:\Users\Admin\AppData\Local\Temp\7nzQeTeU.vum

    Filesize

    1.1MB

    MD5

    e1b8504dae850187903afcc6910c6f8f

    SHA1

    66030f2e6cb1710d218b3096d42350c948145a2d

    SHA256

    66f683fee49f19540024a469bcfc83fa008862b781810b13a17690a183ecc850

    SHA512

    54c7091289a8eb65acfc3666bbe7ba307a9e78ccc92018ba831f839cca9668435d1c497952fd49cfc5f68c9b144b5d7ac22c7e73fa1929d349d8ad021950498f

  • memory/4248-138-0x0000000002050000-0x0000000002166000-memory.dmp

    Filesize

    1.1MB

  • memory/4248-139-0x0000000002050000-0x0000000002166000-memory.dmp

    Filesize

    1.1MB

  • memory/4248-141-0x0000000000680000-0x0000000000686000-memory.dmp

    Filesize

    24KB

  • memory/4248-143-0x0000000002410000-0x00000000024F9000-memory.dmp

    Filesize

    932KB

  • memory/4248-144-0x0000000002500000-0x00000000025D1000-memory.dmp

    Filesize

    836KB

  • memory/4248-147-0x0000000002500000-0x00000000025D1000-memory.dmp

    Filesize

    836KB

  • memory/4248-148-0x0000000002500000-0x00000000025D1000-memory.dmp

    Filesize

    836KB