Analysis

  • max time kernel
    19s
  • max time network
    23s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    27-02-2021 17:48

General

  • Target

    bb1f18.exe

  • Size

    1.1MB

  • MD5

    449d5f628cd5ce61db9b3aca95476a58

  • SHA1

    f83041dd54959fcfc56c6903f96e4859bc68f43e

  • SHA256

    bb1f1816fb5064dcd339ef4ce1018b01324d79a850bf0775a43c1fe2c3ea1816

  • SHA512

    0b71225387610bf26e9ef6e3ce37ebb5e518b2309b810b6bf08c6d87c305cf75caada1d6249eb1f7c4b82cf3d675413ac7e2f68bf842429b7b511eef552b1d03

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb1f18.exe
    "C:\Users\Admin\AppData\Local\Temp\bb1f18.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Users\Admin\AppData\Roaming\1337\WigetFL.exe
      "C:\Users\Admin\AppData\Roaming\1337\WigetFL.exe"
      2⤵
      • Executes dropped EXE
      PID:2016
    • C:\Users\Admin\AppData\Roaming\1337\Logger.exe
      "C:\Users\Admin\AppData\Roaming\1337\Logger.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2040

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\1337\Logger.exe
    MD5

    343f94b57cb857d6ac23080d13ed1536

    SHA1

    56b888836c50904eb24a16ea482ac63614f69887

    SHA256

    fe3c3dab43759b37ce8236614887bfbac1f2954a5733a1bd7ea4d22aadf39f65

    SHA512

    7604b693498ae9690f4513cf4403948c72e33b7d7cc94e9144e2ea9b7d2e7db888efbe13cd61d7e388215cb8e81f13446861a8b4d904507eebcc464cf9981b6f

  • C:\Users\Admin\AppData\Roaming\1337\Logger.exe
    MD5

    343f94b57cb857d6ac23080d13ed1536

    SHA1

    56b888836c50904eb24a16ea482ac63614f69887

    SHA256

    fe3c3dab43759b37ce8236614887bfbac1f2954a5733a1bd7ea4d22aadf39f65

    SHA512

    7604b693498ae9690f4513cf4403948c72e33b7d7cc94e9144e2ea9b7d2e7db888efbe13cd61d7e388215cb8e81f13446861a8b4d904507eebcc464cf9981b6f

  • C:\Users\Admin\AppData\Roaming\1337\WigetFL.exe
    MD5

    14768b61437af5d83d3209e98963730b

    SHA1

    844b0322849f71997a3e91df223da7394bf2d4b3

    SHA256

    1b2d641d96f4739f46662ceb5d43c4527a278cb3231611d52afb91ffc318329f

    SHA512

    0e259da218a66086da603d28a01708201531559c781faccab78a598a155bb8c4651fd8cb46eb322347b441c7649b4a26e949e6c05a73ffcdb461d42f4a111f37

  • \Users\Admin\AppData\Local\Temp\nsx3371.tmp\System.dll
    MD5

    2ae993a2ffec0c137eb51c8832691bcb

    SHA1

    98e0b37b7c14890f8a599f35678af5e9435906e1

    SHA256

    681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

    SHA512

    2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

  • \Users\Admin\AppData\Roaming\1337\Logger.exe
    MD5

    343f94b57cb857d6ac23080d13ed1536

    SHA1

    56b888836c50904eb24a16ea482ac63614f69887

    SHA256

    fe3c3dab43759b37ce8236614887bfbac1f2954a5733a1bd7ea4d22aadf39f65

    SHA512

    7604b693498ae9690f4513cf4403948c72e33b7d7cc94e9144e2ea9b7d2e7db888efbe13cd61d7e388215cb8e81f13446861a8b4d904507eebcc464cf9981b6f

  • \Users\Admin\AppData\Roaming\1337\Logger.exe
    MD5

    343f94b57cb857d6ac23080d13ed1536

    SHA1

    56b888836c50904eb24a16ea482ac63614f69887

    SHA256

    fe3c3dab43759b37ce8236614887bfbac1f2954a5733a1bd7ea4d22aadf39f65

    SHA512

    7604b693498ae9690f4513cf4403948c72e33b7d7cc94e9144e2ea9b7d2e7db888efbe13cd61d7e388215cb8e81f13446861a8b4d904507eebcc464cf9981b6f

  • \Users\Admin\AppData\Roaming\1337\WigetFL.exe
    MD5

    14768b61437af5d83d3209e98963730b

    SHA1

    844b0322849f71997a3e91df223da7394bf2d4b3

    SHA256

    1b2d641d96f4739f46662ceb5d43c4527a278cb3231611d52afb91ffc318329f

    SHA512

    0e259da218a66086da603d28a01708201531559c781faccab78a598a155bb8c4651fd8cb46eb322347b441c7649b4a26e949e6c05a73ffcdb461d42f4a111f37

  • memory/1064-2-0x0000000076101000-0x0000000076103000-memory.dmp
    Filesize

    8KB

  • memory/2016-5-0x0000000000000000-mapping.dmp
  • memory/2040-9-0x0000000000000000-mapping.dmp
  • memory/2040-14-0x0000000000170000-0x0000000000172000-memory.dmp
    Filesize

    8KB

  • memory/2040-13-0x000007FEF52B0000-0x000007FEF5C4D000-memory.dmp
    Filesize

    9.6MB

  • memory/2040-15-0x000007FEF52B0000-0x000007FEF5C4D000-memory.dmp
    Filesize

    9.6MB