Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 04:06

General

  • Target

    tmp.exe

  • Size

    306KB

  • MD5

    3023e739cfa1394e680f4dd2d4ca43ba

  • SHA1

    bdea1c13af13763cddf2a134ec1d272f43081749

  • SHA256

    1485eec815dd8ddecd0149e13f7486df102667c4da1a524101f6eb08f6548814

  • SHA512

    001ecdf994dad7bd92d874f37fa4d7f8027b376160c3dea0f6f6da6a3364adc17e2524fdd29e3cf41b4f52195c5a14ae5ac64f142277456df268eb0b01fa6df3

  • SSDEEP

    6144:vYa6U3ctjJiHPKgFEV7B5wvWsTq/ylTwgNo9QowyDmOggt5lDjOE8pH5a:vYaMZJiHPKuEVF5VsTq6lcdQowyCelDR

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4344
      • C:\Users\Admin\AppData\Local\Temp\uagiu.exe
        "C:\Users\Admin\AppData\Local\Temp\uagiu.exe" C:\Users\Admin\AppData\Local\Temp\wcgzbemkz.a
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:4564
        • C:\Users\Admin\AppData\Local\Temp\uagiu.exe
          "C:\Users\Admin\AppData\Local\Temp\uagiu.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4512
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:392
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:224
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 224 -s 148
            4⤵
            • Program crash
            PID:3888
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 464 -p 224 -ip 224
      1⤵
        PID:4020

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\oabsoy.x

              Filesize

              206KB

              MD5

              f614afe266feff2007c08b216b506cc8

              SHA1

              5a95e27cb874c580ccf0cacf7f9233add2c25595

              SHA256

              1993521a7e1a711b8ced7803ce580ea2abed3499a9aae3a0c53e51123287ffeb

              SHA512

              01f6570e221cd4c1fc80929010402907af513077ce0b52742353843b8be70e05767bd1cbb9727407c4c94564526c0dab14495e0fc3b956bf2be6ee18e094825d

            • C:\Users\Admin\AppData\Local\Temp\uagiu.exe

              Filesize

              147KB

              MD5

              ef3a63f62f128dc5fe47f99ec70d7772

              SHA1

              fca648493e8e9d857c07ab4524c2bd76015eed3a

              SHA256

              e9f8bb15a194af2ed276a1d4192426a7340ec301e447597c090397bc62485db9

              SHA512

              fe407255fed838f27e127eb58dffc09bd1f9adeb120228a844599682f342ae40a02ecb1da467e3cecd9dca8d0c2965949e71d1dcfd787f28c70a97d3045944ac

            • C:\Users\Admin\AppData\Local\Temp\uagiu.exe

              Filesize

              147KB

              MD5

              ef3a63f62f128dc5fe47f99ec70d7772

              SHA1

              fca648493e8e9d857c07ab4524c2bd76015eed3a

              SHA256

              e9f8bb15a194af2ed276a1d4192426a7340ec301e447597c090397bc62485db9

              SHA512

              fe407255fed838f27e127eb58dffc09bd1f9adeb120228a844599682f342ae40a02ecb1da467e3cecd9dca8d0c2965949e71d1dcfd787f28c70a97d3045944ac

            • C:\Users\Admin\AppData\Local\Temp\uagiu.exe

              Filesize

              147KB

              MD5

              ef3a63f62f128dc5fe47f99ec70d7772

              SHA1

              fca648493e8e9d857c07ab4524c2bd76015eed3a

              SHA256

              e9f8bb15a194af2ed276a1d4192426a7340ec301e447597c090397bc62485db9

              SHA512

              fe407255fed838f27e127eb58dffc09bd1f9adeb120228a844599682f342ae40a02ecb1da467e3cecd9dca8d0c2965949e71d1dcfd787f28c70a97d3045944ac

            • C:\Users\Admin\AppData\Local\Temp\wcgzbemkz.a

              Filesize

              5KB

              MD5

              7eb6ae4f8ddbb2fd9605f3d43cdfd281

              SHA1

              8cf7460a974b1f9c950e7fada3444801effdab67

              SHA256

              71a24bde39868b5ca67efc88f0da09020766fd5ecebdc74e4ebd5ad85eb492e0

              SHA512

              cca83ff85f91ed954eb1aac6df9993c86b05c39873887e005e775961015c18724a9401c44c991bc58b8676a2c5657b41350044dca6087369e0a8a98a25281b36

            • memory/392-154-0x0000000000E70000-0x0000000000E9D000-memory.dmp

              Filesize

              180KB

            • memory/392-150-0x0000000000120000-0x0000000000147000-memory.dmp

              Filesize

              156KB

            • memory/392-153-0x0000000000120000-0x0000000000147000-memory.dmp

              Filesize

              156KB

            • memory/392-156-0x0000000002B70000-0x0000000002BFF000-memory.dmp

              Filesize

              572KB

            • memory/392-155-0x0000000002E40000-0x000000000318A000-memory.dmp

              Filesize

              3.3MB

            • memory/3180-174-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-181-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-206-0x0000000000940000-0x0000000000942000-memory.dmp

              Filesize

              8KB

            • memory/3180-207-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-205-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-204-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-203-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-157-0x0000000008430000-0x000000000852B000-memory.dmp

              Filesize

              1004KB

            • memory/3180-165-0x0000000008430000-0x000000000852B000-memory.dmp

              Filesize

              1004KB

            • memory/3180-167-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-168-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-169-0x0000000007E00000-0x0000000007E10000-memory.dmp

              Filesize

              64KB

            • memory/3180-170-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-173-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-172-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-171-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-149-0x0000000008040000-0x0000000008135000-memory.dmp

              Filesize

              980KB

            • memory/3180-176-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-175-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-177-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-178-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-179-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-180-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-202-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-182-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-183-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-184-0x0000000000940000-0x0000000000949000-memory.dmp

              Filesize

              36KB

            • memory/3180-191-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-192-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-193-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-194-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-195-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-196-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-197-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-198-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-199-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-200-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/3180-201-0x00000000071E0000-0x00000000071F0000-memory.dmp

              Filesize

              64KB

            • memory/4512-147-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4512-142-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4512-145-0x0000000000B90000-0x0000000000EDA000-memory.dmp

              Filesize

              3.3MB

            • memory/4512-146-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4512-151-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4512-148-0x0000000000600000-0x0000000000610000-memory.dmp

              Filesize

              64KB

            • memory/4564-140-0x00000000008A0000-0x00000000008A2000-memory.dmp

              Filesize

              8KB