Analysis

  • max time kernel
    8s
  • max time network
    10s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-03-2021 23:08

General

  • Target

    4373d18b2bf09478387fc4e762cf29d6a9ba886e2f39dd4353fb6e8b33fee083.exe

  • Size

    25KB

  • MD5

    cd4cc1545d329de2398ff457e712edb2

  • SHA1

    969b04cf87e367ad0c29ffc8c039cdde63196637

  • SHA256

    4373d18b2bf09478387fc4e762cf29d6a9ba886e2f39dd4353fb6e8b33fee083

  • SHA512

    4ed085bfc53b63c2d25fff05d919731d3dd151759803062b964275f3881f16e3ac77c415e1ad3a94ed46dcc889d1b3eb9932372e81dbcb384339c913500f2fa9

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4373d18b2bf09478387fc4e762cf29d6a9ba886e2f39dd4353fb6e8b33fee083.exe
    "C:\Users\Admin\AppData\Local\Temp\4373d18b2bf09478387fc4e762cf29d6a9ba886e2f39dd4353fb6e8b33fee083.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe
      "C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1928

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe
    MD5

    2fa45b880aaff0ffbdee7fab2fe26fc1

    SHA1

    88cf0017bd1fe25b139ed825b328461fb03acbf6

    SHA256

    e60dd14ebcd97bbe06906e8fd7fcfcfae2fb040994569e60922108b1e9271033

    SHA512

    fbd6645994fd5de26b77e61a80dcf8d12404803783f2bbc471c3dd08629158237436aab41eead2663c0e72e276afbc6368957dbac4e5b1cf6cbbf6ccfd511468

  • C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe
    MD5

    2fa45b880aaff0ffbdee7fab2fe26fc1

    SHA1

    88cf0017bd1fe25b139ed825b328461fb03acbf6

    SHA256

    e60dd14ebcd97bbe06906e8fd7fcfcfae2fb040994569e60922108b1e9271033

    SHA512

    fbd6645994fd5de26b77e61a80dcf8d12404803783f2bbc471c3dd08629158237436aab41eead2663c0e72e276afbc6368957dbac4e5b1cf6cbbf6ccfd511468

  • \Users\Admin\AppData\Local\Temp\hhcbrnaff.exe
    MD5

    2fa45b880aaff0ffbdee7fab2fe26fc1

    SHA1

    88cf0017bd1fe25b139ed825b328461fb03acbf6

    SHA256

    e60dd14ebcd97bbe06906e8fd7fcfcfae2fb040994569e60922108b1e9271033

    SHA512

    fbd6645994fd5de26b77e61a80dcf8d12404803783f2bbc471c3dd08629158237436aab41eead2663c0e72e276afbc6368957dbac4e5b1cf6cbbf6ccfd511468

  • memory/692-10-0x000007FEF7D90000-0x000007FEF800A000-memory.dmp
    Filesize

    2.5MB

  • memory/1724-2-0x00000000761E1000-0x00000000761E3000-memory.dmp
    Filesize

    8KB

  • memory/1724-8-0x0000000002780000-0x0000000002B80000-memory.dmp
    Filesize

    4.0MB

  • memory/1928-4-0x0000000000000000-mapping.dmp
  • memory/1928-9-0x0000000002700000-0x0000000002B00000-memory.dmp
    Filesize

    4.0MB