Analysis

  • max time kernel
    1720s
  • max time network
    1719s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    06-03-2021 07:08

General

  • Target

    Install.exe

  • Size

    852KB

  • MD5

    98d1321a449526557d43498027e78a63

  • SHA1

    d8584de7e33d30a8fc792b62aa7217d44332a345

  • SHA256

    5440a5863002acacb3ddb6b1deb84945aa004ace8bd64938b681e3fe059a8a23

  • SHA512

    3b6f59dbd605e59152837266a3e7814af463bb2cd7c9341c99fc5445de78e2dde73c11735bd145c6ad9c6d08d2c2810155558d5e9c441ac8b69ed609562385d0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Install.exe
    "C:\Users\Admin\AppData\Local\Temp\Install.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\FGQUJDCTMM\multitimer.exe
      "C:\Users\Admin\AppData\Local\Temp\FGQUJDCTMM\multitimer.exe" 0 3060197d33d91c80.94013368 0 101
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Users\Admin\AppData\Local\Temp\FGQUJDCTMM\multitimer.exe
        "C:\Users\Admin\AppData\Local\Temp\FGQUJDCTMM\multitimer.exe" 1 101
        3⤵
        • Executes dropped EXE
        PID:1648

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1308-11-0x00000000009C0000-0x00000000009C2000-memory.dmp

    Filesize

    8KB

  • memory/1308-9-0x000007FEF5FC0000-0x000007FEF695D000-memory.dmp

    Filesize

    9.6MB

  • memory/1308-10-0x000007FEF5FC0000-0x000007FEF695D000-memory.dmp

    Filesize

    9.6MB

  • memory/1648-15-0x000007FEF5FC0000-0x000007FEF695D000-memory.dmp

    Filesize

    9.6MB

  • memory/1648-16-0x000007FEF5FC0000-0x000007FEF695D000-memory.dmp

    Filesize

    9.6MB

  • memory/1648-18-0x0000000000AB0000-0x0000000000AB2000-memory.dmp

    Filesize

    8KB

  • memory/1724-2-0x000007FEF5F70000-0x000007FEF695C000-memory.dmp

    Filesize

    9.9MB

  • memory/1724-5-0x000000001B560000-0x000000001B562000-memory.dmp

    Filesize

    8KB

  • memory/1724-3-0x0000000000360000-0x0000000000361000-memory.dmp

    Filesize

    4KB