Analysis

  • max time kernel
    126s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    16-02-2021 18:57

General

  • Target

    df73c80c3b297b161dd6681a354b9392.exe

  • Size

    1.9MB

  • MD5

    df73c80c3b297b161dd6681a354b9392

  • SHA1

    3db99991178812a5d4f5f7468151055884109699

  • SHA256

    3e43a04b037b6e092c352fcf85eef535cf036ee8a4b7100cb15f7343ab2b097f

  • SHA512

    58d611a2d0e328a36239e04bcf145e51076b9bb7ef113db732812ddda76d71064acab13ae1abc7264f8eb9ce60118f7bc94ef9c484327cfda33a59e16394a8e6

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df73c80c3b297b161dd6681a354b9392.exe
    "C:\Users\Admin\AppData\Local\Temp\df73c80c3b297b161dd6681a354b9392.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\AppData\Local\Temp\07KSSZRRUY\multitimer.exe
      "C:\Users\Admin\AppData\Local\Temp\07KSSZRRUY\multitimer.exe" 0 30601988b56f78c9.53290271 0 102
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Users\Admin\AppData\Local\Temp\07KSSZRRUY\multitimer.exe
        "C:\Users\Admin\AppData\Local\Temp\07KSSZRRUY\multitimer.exe" 1
        3⤵
        • Executes dropped EXE
        PID:1664

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\07KSSZRRUY\multitimer.exe
    MD5

    ccf73cd3ed0ea55bd26d6b297cd0aa68

    SHA1

    86c4d85647e6b5bde8a5b65b31d57d663b9e3a10

    SHA256

    62779784407a8ee38c89e5bdfcbd2290b5f5d6f24e7db68da3a04382b425699f

    SHA512

    fc923af24202cce4333616b2fe0ad9e96a3fce0d95f2cc3698bc9b101d142ab64049726a66f9b32eb7a1c05996213e88ab05bfffc7094deffd4f201dc88c1583

  • C:\Users\Admin\AppData\Local\Temp\07KSSZRRUY\multitimer.exe
    MD5

    ccf73cd3ed0ea55bd26d6b297cd0aa68

    SHA1

    86c4d85647e6b5bde8a5b65b31d57d663b9e3a10

    SHA256

    62779784407a8ee38c89e5bdfcbd2290b5f5d6f24e7db68da3a04382b425699f

    SHA512

    fc923af24202cce4333616b2fe0ad9e96a3fce0d95f2cc3698bc9b101d142ab64049726a66f9b32eb7a1c05996213e88ab05bfffc7094deffd4f201dc88c1583

  • C:\Users\Admin\AppData\Local\Temp\07KSSZRRUY\multitimer.exe
    MD5

    ccf73cd3ed0ea55bd26d6b297cd0aa68

    SHA1

    86c4d85647e6b5bde8a5b65b31d57d663b9e3a10

    SHA256

    62779784407a8ee38c89e5bdfcbd2290b5f5d6f24e7db68da3a04382b425699f

    SHA512

    fc923af24202cce4333616b2fe0ad9e96a3fce0d95f2cc3698bc9b101d142ab64049726a66f9b32eb7a1c05996213e88ab05bfffc7094deffd4f201dc88c1583

  • C:\Users\Admin\AppData\Local\Temp\07KSSZRRUY\multitimer.exe.config
    MD5

    3f1498c07d8713fe5c315db15a2a2cf3

    SHA1

    ef5f42fd21f6e72bdc74794f2496884d9c40bbfb

    SHA256

    52ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0

    SHA512

    cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch
    MD5

    bfa6e65e9a03b4f4c78dd0ff7823f916

    SHA1

    8b78bfbfe3f7bbe7e649b42ec2d0974996b0eae2

    SHA256

    857c40b901183c452ff788db367f28a2a4726d89c32bd75f59f6e30490defe5f

    SHA512

    3c270ca6f76fa54820a0fe010ac4246ffd5705e168502456eb1fcafc34f5a095fcb22e2607e9e39fa0ce48f0656d08db42bb6e338e9abe780ac4bf4de86a6b7b

  • memory/1112-11-0x00000000022E0000-0x00000000022E2000-memory.dmp
    Filesize

    8KB

  • memory/1112-9-0x000007FEEE650000-0x000007FEEEFED000-memory.dmp
    Filesize

    9.6MB

  • memory/1112-10-0x000007FEEE650000-0x000007FEEEFED000-memory.dmp
    Filesize

    9.6MB

  • memory/1112-6-0x0000000000000000-mapping.dmp
  • memory/1664-13-0x0000000000000000-mapping.dmp
  • memory/1664-15-0x000007FEEE650000-0x000007FEEEFED000-memory.dmp
    Filesize

    9.6MB

  • memory/1664-16-0x000007FEEE650000-0x000007FEEEFED000-memory.dmp
    Filesize

    9.6MB

  • memory/1664-18-0x00000000021E0000-0x00000000021E2000-memory.dmp
    Filesize

    8KB

  • memory/1812-2-0x000007FEF5990000-0x000007FEF637C000-memory.dmp
    Filesize

    9.9MB

  • memory/1812-5-0x000000001B060000-0x000000001B062000-memory.dmp
    Filesize

    8KB

  • memory/1812-3-0x0000000000860000-0x0000000000861000-memory.dmp
    Filesize

    4KB