Analysis

  • max time kernel
    1720s
  • max time network
    1719s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    06-03-2021 07:08

General

  • Target

    Install.exe

  • Size

    852KB

  • MD5

    98d1321a449526557d43498027e78a63

  • SHA1

    d8584de7e33d30a8fc792b62aa7217d44332a345

  • SHA256

    5440a5863002acacb3ddb6b1deb84945aa004ace8bd64938b681e3fe059a8a23

  • SHA512

    3b6f59dbd605e59152837266a3e7814af463bb2cd7c9341c99fc5445de78e2dde73c11735bd145c6ad9c6d08d2c2810155558d5e9c441ac8b69ed609562385d0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Install.exe
    "C:\Users\Admin\AppData\Local\Temp\Install.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\FGQUJDCTMM\multitimer.exe
      "C:\Users\Admin\AppData\Local\Temp\FGQUJDCTMM\multitimer.exe" 0 3060197d33d91c80.94013368 0 101
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Users\Admin\AppData\Local\Temp\FGQUJDCTMM\multitimer.exe
        "C:\Users\Admin\AppData\Local\Temp\FGQUJDCTMM\multitimer.exe" 1 101
        3⤵
        • Executes dropped EXE
        PID:1648

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FGQUJDCTMM\multitimer.exe
    MD5

    004c561f04787d2e33ed0806fe900cdd

    SHA1

    7ec34d867dc658d96da4fbc6a1daedc75fe5f2fd

    SHA256

    b905c0862fd8f733fa0302a31b3495f4eb02a840520775f9683c6e2f3fb160f6

    SHA512

    3b0110c051bed613745ff05cad9e5ad85f6deb55146a3f6b2cf20a283dd21fbefad7eee826841088697f1cdf97b43889917c4af87f97cbc5754e4455f8086472

  • C:\Users\Admin\AppData\Local\Temp\FGQUJDCTMM\multitimer.exe
    MD5

    004c561f04787d2e33ed0806fe900cdd

    SHA1

    7ec34d867dc658d96da4fbc6a1daedc75fe5f2fd

    SHA256

    b905c0862fd8f733fa0302a31b3495f4eb02a840520775f9683c6e2f3fb160f6

    SHA512

    3b0110c051bed613745ff05cad9e5ad85f6deb55146a3f6b2cf20a283dd21fbefad7eee826841088697f1cdf97b43889917c4af87f97cbc5754e4455f8086472

  • C:\Users\Admin\AppData\Local\Temp\FGQUJDCTMM\multitimer.exe
    MD5

    004c561f04787d2e33ed0806fe900cdd

    SHA1

    7ec34d867dc658d96da4fbc6a1daedc75fe5f2fd

    SHA256

    b905c0862fd8f733fa0302a31b3495f4eb02a840520775f9683c6e2f3fb160f6

    SHA512

    3b0110c051bed613745ff05cad9e5ad85f6deb55146a3f6b2cf20a283dd21fbefad7eee826841088697f1cdf97b43889917c4af87f97cbc5754e4455f8086472

  • C:\Users\Admin\AppData\Local\Temp\FGQUJDCTMM\multitimer.exe.config
    MD5

    3f1498c07d8713fe5c315db15a2a2cf3

    SHA1

    ef5f42fd21f6e72bdc74794f2496884d9c40bbfb

    SHA256

    52ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0

    SHA512

    cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch
    MD5

    6b32cfdf545f3c39314e6e6a06e7dbd6

    SHA1

    d38335eae73c6bc77b4a2e24983d9bf0db6b1d0f

    SHA256

    49745f85c8bcfa91c82be64bdcdbd53fff1c6a6cd11d69196ddec95bd8ddd6a7

    SHA512

    6e6e4d9e25a6a19be24ce4ad8406b10da82c9abed7086f3a20d2284778b6fa02fa680bb7f360a9a538b4ffe5a8d8babf8b22ff935ca364a157af4eaec179878e

  • memory/1308-11-0x00000000009C0000-0x00000000009C2000-memory.dmp
    Filesize

    8KB

  • memory/1308-9-0x000007FEF5FC0000-0x000007FEF695D000-memory.dmp
    Filesize

    9.6MB

  • memory/1308-10-0x000007FEF5FC0000-0x000007FEF695D000-memory.dmp
    Filesize

    9.6MB

  • memory/1308-6-0x0000000000000000-mapping.dmp
  • memory/1648-13-0x0000000000000000-mapping.dmp
  • memory/1648-15-0x000007FEF5FC0000-0x000007FEF695D000-memory.dmp
    Filesize

    9.6MB

  • memory/1648-16-0x000007FEF5FC0000-0x000007FEF695D000-memory.dmp
    Filesize

    9.6MB

  • memory/1648-18-0x0000000000AB0000-0x0000000000AB2000-memory.dmp
    Filesize

    8KB

  • memory/1724-2-0x000007FEF5F70000-0x000007FEF695C000-memory.dmp
    Filesize

    9.9MB

  • memory/1724-5-0x000000001B560000-0x000000001B562000-memory.dmp
    Filesize

    8KB

  • memory/1724-3-0x0000000000360000-0x0000000000361000-memory.dmp
    Filesize

    4KB