Resubmissions

12-08-2021 18:33

210812-z3kcywcakj 8

26-07-2021 16:00

210726-pcynvcchwn 10

25-07-2021 18:10

210725-m5zdsbkjn2 8

Analysis

  • max time kernel
    15s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    25-07-2021 18:10

General

  • Target

    Star-Wars-Battlefron_330757428.exe

  • Size

    7.4MB

  • MD5

    1f916117907696b1166fd3b79e9905f9

  • SHA1

    50b83e0dcc2205b8e153ba5898498ef5ee01b943

  • SHA256

    6eafa7c61e42d196916baffa8392658241fe214d13edefeeffde6aa0619e3507

  • SHA512

    b472b663c0536f2ee6af7ce2c0d8450fbbbc0c32ceef8e22d66f600a19a92c60e5763ce481f3d69f146c4fcd39c75da8d904a081d60d3d2f0aa2d0efe7789048

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Star-Wars-Battlefron_330757428.exe
    "C:\Users\Admin\AppData\Local\Temp\Star-Wars-Battlefron_330757428.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3968
    • C:\Users\Admin\AppData\Local\Temp\is-DUINA.tmp\Star-Wars-Battlefron_330757428.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-DUINA.tmp\Star-Wars-Battlefron_330757428.tmp" /SL5="$201C8,7020769,1072640,C:\Users\Admin\AppData\Local\Temp\Star-Wars-Battlefron_330757428.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exe
        "C:\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exe" Star-Wars-Battlefron_330757428.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2672

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exe
    MD5

    56f12ac950b313c857c4de27ed86d334

    SHA1

    2fb150324007af4b7790af628c1ae0ccadf01b82

    SHA256

    caca1e988b91716e899e5a37d2fa97c17f0d5004cb751800e84c966291136f19

    SHA512

    08057cc1d38a53a8283acfc00ce4ed443afda1a8d7baa343f988f785df37402c8f4929d940c2d83a13fc43905dee3f323fbc0ad5fcfcb4346d8a156d1a722d86

  • C:\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exe
    MD5

    56f12ac950b313c857c4de27ed86d334

    SHA1

    2fb150324007af4b7790af628c1ae0ccadf01b82

    SHA256

    caca1e988b91716e899e5a37d2fa97c17f0d5004cb751800e84c966291136f19

    SHA512

    08057cc1d38a53a8283acfc00ce4ed443afda1a8d7baa343f988f785df37402c8f4929d940c2d83a13fc43905dee3f323fbc0ad5fcfcb4346d8a156d1a722d86

  • C:\Users\Admin\AppData\Local\Temp\is-DUINA.tmp\Star-Wars-Battlefron_330757428.tmp
    MD5

    1af5a1ed59fcb0e2f61839fae950a2f8

    SHA1

    917429dd437ff355c3061f25c4d1068a95420d2c

    SHA256

    b7767fd4addb557368ff1e605d358e0e36d39e526dc72bdd3eb28ff78a302ef9

    SHA512

    dc5e3bb735d728ab4d6dc50809e9f156c92e00dfaea68d78f7e7c7d4c22c6e351a46b256422401b9758273bbd04b9848ac7e8fde315d817a34c473dd4d4ae24e

  • C:\Users\Admin\AppData\Local\Temp\is-DUINA.tmp\Star-Wars-Battlefron_330757428.tmp
    MD5

    1af5a1ed59fcb0e2f61839fae950a2f8

    SHA1

    917429dd437ff355c3061f25c4d1068a95420d2c

    SHA256

    b7767fd4addb557368ff1e605d358e0e36d39e526dc72bdd3eb28ff78a302ef9

    SHA512

    dc5e3bb735d728ab4d6dc50809e9f156c92e00dfaea68d78f7e7c7d4c22c6e351a46b256422401b9758273bbd04b9848ac7e8fde315d817a34c473dd4d4ae24e

  • \Users\Admin\AppData\Local\Temp\is-V74U4.tmp\_isetup\_isdecmp.dll
    MD5

    77d6d961f71a8c558513bed6fd0ad6f1

    SHA1

    122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a

    SHA256

    5da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0

    SHA512

    b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a

  • \Users\Admin\AppData\Local\Temp\is-V74U4.tmp\_isetup\_isdecmp.dll
    MD5

    77d6d961f71a8c558513bed6fd0ad6f1

    SHA1

    122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a

    SHA256

    5da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0

    SHA512

    b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a

  • memory/1944-120-0x0000000003591000-0x0000000003593000-memory.dmp
    Filesize

    8KB

  • memory/1944-121-0x0000000000870000-0x0000000000871000-memory.dmp
    Filesize

    4KB

  • memory/1944-116-0x0000000000000000-mapping.dmp
  • memory/2672-123-0x0000000000000000-mapping.dmp
  • memory/2672-126-0x0000000000400000-0x000000000170A000-memory.dmp
    Filesize

    19.0MB

  • memory/2672-127-0x00000000042F0000-0x00000000042F1000-memory.dmp
    Filesize

    4KB

  • memory/3968-115-0x0000000000400000-0x0000000000514000-memory.dmp
    Filesize

    1.1MB