Analysis

  • max time kernel
    97s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/03/2023, 03:52

General

  • Target

    _9GdMlF68jk‮gpj.scr

  • Size

    1.2MB

  • MD5

    239cb4e09811dc08015ff37b8c000d18

  • SHA1

    13ac922dc29fd0dc066d4dcadf1547570b9df632

  • SHA256

    f3570854e996624ece2b16c62a29450958662a61f9b361e6c0527d84a1018df5

  • SHA512

    ae18413fc26c546088c9b9e6539d3089f468aad096fa58a26fd601c66d4983edbff9ca395d0eb8ac58c460c237603b0510352ac9ee4c6e548f728ec9171ae213

  • SSDEEP

    24576:H+AXohz6RNt+mbPgXKvbGixEhfskGkc9WwlbPjXSYc1:eA4O+m64Co79j/

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://pastebin.com/raw/vNcCt60A

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\_9GdMlF68jk‮gpj.scr
    "C:\Users\Admin\AppData\Local\Temp\_9GdMlF68jk‮gpj.scr" /S
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Users\Admin\AppData\Local\Temp\service.exe
      "C:\Users\Admin\AppData\Local\Temp\service.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\config.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3256
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Unrestricted -nologo -command .\service.ps1
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2972

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\config.vbs

          Filesize

          149B

          MD5

          a5871da9a2df94e7f9e631b8d88db6f2

          SHA1

          0fe4a2d4ee43f0ddd04fdf6fcf18ea157f197b6b

          SHA256

          c3da432bc28fc4cd5346b0b1350217dbc1fb5939dd3436a1a1415d5f5a4c821d

          SHA512

          4c31e60bd2d823eec6f3c83973b0845c104632006877e3960ff3c7abc69b05f41d09a2dcede557d642b5e74a128800dfd543f2f88026a1400172ec4ea850084c

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\service.ps1

          Filesize

          949B

          MD5

          8a97b217587bf21df5b6be29428a1251

          SHA1

          33bc1ad54acc40f29d1b09767811c4a9f779f9a5

          SHA256

          ac975c8129b58f138e0f9880d5d63e6ca9e350c875e09a6dd5c16b40eaa9ea0d

          SHA512

          944c4fbbb3e92afad4cb4fc9f675cbe0b12ff3ef371fa1a5acdffb8489d7c7dde6e2cb8c2a1e194db9eba8e7c74db82b91ceaa40bc3f189924adaeae01cc2409

        • C:\Users\Admin\AppData\Local\Temp\_9GdMlF68jkscr.jpg

          Filesize

          386KB

          MD5

          83a748c4bd0aa98bf58704d1fa2e5aca

          SHA1

          72f6af30c3764389bc04ba5bb9619b73a85c9406

          SHA256

          1fb90118cf42b52cff9c2f7a91a5bef156984dcd67d4e44fc7f1cb541b39010d

          SHA512

          9311ffa268fb082c4b8926f41c64ff36784e0e000dad8eb4c11736a72b3867d68e7f68b35ae1d9ac859eeba2461f2dd0bd61d7ac53cfc000a285c20824e2b300

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mp0xzaag.cix.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\service.exe

          Filesize

          283KB

          MD5

          c801ed2ca1f4f204ca5d28a6ab366949

          SHA1

          781f35df9b44560982623ef0259a05fbf99b8fcc

          SHA256

          c83bb3ba68f3f4fde63abea1a95a89566c4a8b75bac40d47b8733a1dac0d1658

          SHA512

          2d910f09aaeaf0ad6e769f5148ce61f4d284468da1f109434602e2e4c7ddd567d41cd6dae95aba72133dc77fcf35d9814be6c645d05f40d8268ab9036adce45b

        • C:\Users\Admin\AppData\Local\Temp\service.exe

          Filesize

          283KB

          MD5

          c801ed2ca1f4f204ca5d28a6ab366949

          SHA1

          781f35df9b44560982623ef0259a05fbf99b8fcc

          SHA256

          c83bb3ba68f3f4fde63abea1a95a89566c4a8b75bac40d47b8733a1dac0d1658

          SHA512

          2d910f09aaeaf0ad6e769f5148ce61f4d284468da1f109434602e2e4c7ddd567d41cd6dae95aba72133dc77fcf35d9814be6c645d05f40d8268ab9036adce45b

        • C:\Users\Admin\AppData\Local\Temp\service.exe

          Filesize

          283KB

          MD5

          c801ed2ca1f4f204ca5d28a6ab366949

          SHA1

          781f35df9b44560982623ef0259a05fbf99b8fcc

          SHA256

          c83bb3ba68f3f4fde63abea1a95a89566c4a8b75bac40d47b8733a1dac0d1658

          SHA512

          2d910f09aaeaf0ad6e769f5148ce61f4d284468da1f109434602e2e4c7ddd567d41cd6dae95aba72133dc77fcf35d9814be6c645d05f40d8268ab9036adce45b

        • memory/2972-205-0x0000000005670000-0x0000000005680000-memory.dmp

          Filesize

          64KB

        • memory/2972-209-0x0000000008150000-0x00000000086F4000-memory.dmp

          Filesize

          5.6MB

        • memory/2972-190-0x0000000005670000-0x0000000005680000-memory.dmp

          Filesize

          64KB

        • memory/2972-191-0x0000000005AA0000-0x0000000005AC2000-memory.dmp

          Filesize

          136KB

        • memory/2972-192-0x0000000005C40000-0x0000000005CA6000-memory.dmp

          Filesize

          408KB

        • memory/2972-188-0x0000000005CB0000-0x00000000062D8000-memory.dmp

          Filesize

          6.2MB

        • memory/2972-198-0x0000000006350000-0x00000000063B6000-memory.dmp

          Filesize

          408KB

        • memory/2972-203-0x0000000006930000-0x000000000694E000-memory.dmp

          Filesize

          120KB

        • memory/2972-187-0x0000000003020000-0x0000000003056000-memory.dmp

          Filesize

          216KB

        • memory/2972-229-0x0000000008C80000-0x0000000008C88000-memory.dmp

          Filesize

          32KB

        • memory/2972-206-0x0000000007B00000-0x0000000007B96000-memory.dmp

          Filesize

          600KB

        • memory/2972-207-0x0000000006EA0000-0x0000000006EBA000-memory.dmp

          Filesize

          104KB

        • memory/2972-208-0x0000000006EC0000-0x0000000006EE2000-memory.dmp

          Filesize

          136KB

        • memory/2972-189-0x0000000005670000-0x0000000005680000-memory.dmp

          Filesize

          64KB

        • memory/2972-210-0x0000000008D80000-0x00000000093FA000-memory.dmp

          Filesize

          6.5MB

        • memory/2972-211-0x0000000007C80000-0x0000000007CB2000-memory.dmp

          Filesize

          200KB

        • memory/2972-212-0x000000006F420000-0x000000006F46C000-memory.dmp

          Filesize

          304KB

        • memory/2972-222-0x0000000008990000-0x00000000089AE000-memory.dmp

          Filesize

          120KB

        • memory/2972-223-0x0000000008AB0000-0x0000000008ABA000-memory.dmp

          Filesize

          40KB

        • memory/2972-224-0x0000000005670000-0x0000000005680000-memory.dmp

          Filesize

          64KB

        • memory/2972-225-0x0000000005670000-0x0000000005680000-memory.dmp

          Filesize

          64KB

        • memory/2972-226-0x000000007F540000-0x000000007F550000-memory.dmp

          Filesize

          64KB

        • memory/2972-227-0x0000000008C30000-0x0000000008C3E000-memory.dmp

          Filesize

          56KB

        • memory/2972-228-0x0000000008C90000-0x0000000008CAA000-memory.dmp

          Filesize

          104KB

        • memory/4644-133-0x0000000000400000-0x000000000052D000-memory.dmp

          Filesize

          1.2MB