Analysis

  • max time kernel
    127s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/03/2023, 01:14

General

  • Target

    dc828e4a8e7ecfa6581ae1fbadb716bff394615efa28a899e62fb2856c03fb7b.exe

  • Size

    1.6MB

  • MD5

    58c300f1ab38828caa63a91429afdbf5

  • SHA1

    8150d02d5ad8470e3b1a010135b3f14efc252e21

  • SHA256

    dc828e4a8e7ecfa6581ae1fbadb716bff394615efa28a899e62fb2856c03fb7b

  • SHA512

    45854dfd048414810e77b12e9236885b224b3960a0b2375aafccfbf25d863057b1f7018478b2885a47198596d59d541e1b42beeab9f122b592668e94d2a485cd

  • SSDEEP

    49152:OCWhF7BfJXAEskFBd8lJ8gNNV085zx+s7T6j79Q:OCWhF7BfKE/jqJ8KA85zx+sf6jxQ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc828e4a8e7ecfa6581ae1fbadb716bff394615efa28a899e62fb2856c03fb7b.exe
    "C:\Users\Admin\AppData\Local\Temp\dc828e4a8e7ecfa6581ae1fbadb716bff394615efa28a899e62fb2856c03fb7b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4548
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" .\PP899OF.C
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\PP899OF.C
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4212
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\PP899OF.C
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3700
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\PP899OF.C
            5⤵
            • Loads dropped DLL
            PID:5020

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\PP899OF.C

          Filesize

          1.0MB

          MD5

          052ce852f8bbc9c16ad83add6bb67b06

          SHA1

          c6c264270df6b2b480d02f380a91531ef752a51f

          SHA256

          6c5154eca9c3e8fd3a963a81c5437b4733179b590991bb5137a7e83200f4e061

          SHA512

          f59449fdcc801500d512919d3dee7092aa146cf6b6a00cb804871d45868e43a48c79ecfc0650078f6127aee2a0687b34061a944e4c395f34400d46055d5af371

        • C:\Users\Admin\AppData\Local\Temp\pp899OF.C

          Filesize

          1.0MB

          MD5

          052ce852f8bbc9c16ad83add6bb67b06

          SHA1

          c6c264270df6b2b480d02f380a91531ef752a51f

          SHA256

          6c5154eca9c3e8fd3a963a81c5437b4733179b590991bb5137a7e83200f4e061

          SHA512

          f59449fdcc801500d512919d3dee7092aa146cf6b6a00cb804871d45868e43a48c79ecfc0650078f6127aee2a0687b34061a944e4c395f34400d46055d5af371

        • C:\Users\Admin\AppData\Local\Temp\pp899OF.C

          Filesize

          1.0MB

          MD5

          052ce852f8bbc9c16ad83add6bb67b06

          SHA1

          c6c264270df6b2b480d02f380a91531ef752a51f

          SHA256

          6c5154eca9c3e8fd3a963a81c5437b4733179b590991bb5137a7e83200f4e061

          SHA512

          f59449fdcc801500d512919d3dee7092aa146cf6b6a00cb804871d45868e43a48c79ecfc0650078f6127aee2a0687b34061a944e4c395f34400d46055d5af371

        • memory/4212-145-0x0000000003380000-0x000000000344D000-memory.dmp

          Filesize

          820KB

        • memory/4212-140-0x0000000003280000-0x0000000003363000-memory.dmp

          Filesize

          908KB

        • memory/4212-141-0x0000000003380000-0x000000000344D000-memory.dmp

          Filesize

          820KB

        • memory/4212-142-0x0000000003380000-0x000000000344D000-memory.dmp

          Filesize

          820KB

        • memory/4212-144-0x0000000003380000-0x000000000344D000-memory.dmp

          Filesize

          820KB

        • memory/4212-137-0x0000000003060000-0x0000000003066000-memory.dmp

          Filesize

          24KB

        • memory/4212-138-0x0000000000400000-0x0000000000508000-memory.dmp

          Filesize

          1.0MB

        • memory/5020-149-0x0000000002E60000-0x0000000002E66000-memory.dmp

          Filesize

          24KB

        • memory/5020-150-0x00000000031C0000-0x00000000032A3000-memory.dmp

          Filesize

          908KB

        • memory/5020-151-0x0000000000400000-0x0000000000508000-memory.dmp

          Filesize

          1.0MB

        • memory/5020-153-0x00000000032B0000-0x000000000337D000-memory.dmp

          Filesize

          820KB

        • memory/5020-155-0x00000000032B0000-0x000000000337D000-memory.dmp

          Filesize

          820KB

        • memory/5020-156-0x00000000032B0000-0x000000000337D000-memory.dmp

          Filesize

          820KB