Analysis

  • max time kernel
    29s
  • max time network
    115s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    05-05-2021 02:41

General

  • Target

    fd7b0ab8f0c2dab25a9652914d02846e32da3298ab43d9bbfa50aec311bccb02.exe

  • Size

    92KB

  • MD5

    ee5cd74c758b461f9112ebd7cac7bd8a

  • SHA1

    dd5eeed5640773729d1eb86838769f244009c902

  • SHA256

    fd7b0ab8f0c2dab25a9652914d02846e32da3298ab43d9bbfa50aec311bccb02

  • SHA512

    a786db5e0383ae5b82aa6273984c61aadad0150e68e34009cdd8d18aa90bb61852ff7c809cc020dc3e530cd88834e7734756270faa0eca1c07a9f4c58bff6568

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd7b0ab8f0c2dab25a9652914d02846e32da3298ab43d9bbfa50aec311bccb02.exe
    "C:\Users\Admin\AppData\Local\Temp\fd7b0ab8f0c2dab25a9652914d02846e32da3298ab43d9bbfa50aec311bccb02.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Users\Admin\AppData\Local\Temp\KciTJVOA.exe
      C:\Users\Admin\AppData\Local\Temp\KciTJVOA.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:3964
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\47d50e42.bat" "
        3⤵
          PID:688

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\47d50e42.bat
      MD5

      24db57d6f74fa3982f4a3b6602af5a13

      SHA1

      df3d756688c49a5510e29071a989886190d06a08

      SHA256

      8208c5c6fe3f5e87bace820ce1f253b73b4793b60d21b3171d8a6801ebe1b651

      SHA512

      8ab6904782d4f3b99817de06d6cac129669deaee7f99db1300f3eb28493de1fb90e03fc4fb9f8113fcbfd5a7437d42b7e77d4620f6300be3f529a4ccb671a613

    • C:\Users\Admin\AppData\Local\Temp\KciTJVOA.exe
      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • C:\Users\Admin\AppData\Local\Temp\KciTJVOA.exe
      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • memory/688-117-0x0000000000000000-mapping.dmp
    • memory/3964-114-0x0000000000000000-mapping.dmp