Analysis

  • max time kernel
    310s
  • max time network
    342s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 15:55

General

  • Target

    工作报表.exe

  • Size

    802KB

  • MD5

    43dc1d7eeef9b4ca0d455404b12c34c8

  • SHA1

    2e618174d09b00abc16d34bff7b646e036adf253

  • SHA256

    a1ee855e975db8957456fc60c33eb040b7bdc2ff79dbd9799f379a4dcade71bf

  • SHA512

    b65a6542520ae094d8f9101d062339a997aa2eaed426e3aaa4c79145d97debf75062df334df4c02d874ebe15731e035bbf7b7cd0f55c248d4b6a45294c5c70c7

  • SSDEEP

    24576:Sny/f9uCOXP25JiBvuXwKhbBh4iv/IVVWX77Sj+ithPW1:XF0IJSmgaVhvv/IVKyj+d

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\工作报表.exe
    "C:\Users\Admin\AppData\Local\Temp\工作报表.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Project.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Project.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3200

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Project.exe

    Filesize

    1.1MB

    MD5

    4d4f8aea7be8e5f2372f6dbca75aa8ba

    SHA1

    5ca38dbc0188d1a93a043562f67cf4319ffdd24d

    SHA256

    75451351d739d060273d8f6985b42596e37fc7acc27130e44dee16c589c012e2

    SHA512

    78f35eeeac14b8a4aabff7909f8770f13397e7f892cc46f48575818ede272c2d2d40a9bd20466144cd0d9044713002205be72212187e231a966a109b8f761097

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Project.exe

    Filesize

    1.1MB

    MD5

    4d4f8aea7be8e5f2372f6dbca75aa8ba

    SHA1

    5ca38dbc0188d1a93a043562f67cf4319ffdd24d

    SHA256

    75451351d739d060273d8f6985b42596e37fc7acc27130e44dee16c589c012e2

    SHA512

    78f35eeeac14b8a4aabff7909f8770f13397e7f892cc46f48575818ede272c2d2d40a9bd20466144cd0d9044713002205be72212187e231a966a109b8f761097

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Project.exe

    Filesize

    1.1MB

    MD5

    4d4f8aea7be8e5f2372f6dbca75aa8ba

    SHA1

    5ca38dbc0188d1a93a043562f67cf4319ffdd24d

    SHA256

    75451351d739d060273d8f6985b42596e37fc7acc27130e44dee16c589c012e2

    SHA512

    78f35eeeac14b8a4aabff7909f8770f13397e7f892cc46f48575818ede272c2d2d40a9bd20466144cd0d9044713002205be72212187e231a966a109b8f761097

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\VMProtectSDK32.dll

    Filesize

    98KB

    MD5

    29e0b67635a30d87d929bc1614eff68f

    SHA1

    180a56d7fb6473ae8449fea7f2e6f105e9e5bb0b

    SHA256

    b2dd017dd8bf60e5a439a202af9e4dbd8a4bf57d72e6dc7528484c6f34eadc8e

    SHA512

    68a8266a1a6f2b270e9dff6b553fff4f7557ed05496aa8007b29a3bacfcf9d4228175a34460ceb43a797e8e7f44d7b33088c67fd835e3e56c64e92868ef27c49

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\vmprotectsdk32.dll

    Filesize

    98KB

    MD5

    29e0b67635a30d87d929bc1614eff68f

    SHA1

    180a56d7fb6473ae8449fea7f2e6f105e9e5bb0b

    SHA256

    b2dd017dd8bf60e5a439a202af9e4dbd8a4bf57d72e6dc7528484c6f34eadc8e

    SHA512

    68a8266a1a6f2b270e9dff6b553fff4f7557ed05496aa8007b29a3bacfcf9d4228175a34460ceb43a797e8e7f44d7b33088c67fd835e3e56c64e92868ef27c49

  • memory/3200-151-0x0000000000400000-0x0000000000719000-memory.dmp

    Filesize

    3.1MB

  • memory/3200-147-0x0000000000400000-0x0000000000719000-memory.dmp

    Filesize

    3.1MB

  • memory/3200-152-0x0000000000400000-0x0000000000719000-memory.dmp

    Filesize

    3.1MB

  • memory/3200-153-0x0000000000400000-0x0000000000719000-memory.dmp

    Filesize

    3.1MB

  • memory/3200-150-0x0000000000400000-0x0000000000719000-memory.dmp

    Filesize

    3.1MB

  • memory/3200-154-0x0000000000400000-0x0000000000719000-memory.dmp

    Filesize

    3.1MB

  • memory/3200-155-0x0000000000B20000-0x0000000000B21000-memory.dmp

    Filesize

    4KB

  • memory/3200-156-0x0000000000400000-0x0000000000719000-memory.dmp

    Filesize

    3.1MB