Analysis

  • max time kernel
    38s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    25-08-2021 12:44

General

  • Target

    MACHINE_.EXE

  • Size

    552KB

  • MD5

    dd29df9b14e9165a7e218ccb399934b5

  • SHA1

    e5b3e6f043612e53cd9fbae00b93102596238f42

  • SHA256

    9051b63011b57f14eb413563f9ee38a2e52a41b20a1c165f2daf057eb7dc2766

  • SHA512

    7161a2df32c9da9823cf7bfd11874c8f71def013fc8ff12a06ac9c5c045bbba1e2d077b9f7bad32d1bbe88862804119da419f8951d5256bc57aef6cb3f393811

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MACHINE_.EXE
    "C:\Users\Admin\AppData\Local\Temp\MACHINE_.EXE"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Users\Admin\AppData\Local\Temp\MACHINE_.EXE
      "C:\Users\Admin\AppData\Local\Temp\MACHINE_.EXE"
      2⤵
        PID:1828

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/752-60-0x0000000075451000-0x0000000075453000-memory.dmp
      Filesize

      8KB

    • memory/752-61-0x0000000000660000-0x0000000000661000-memory.dmp
      Filesize

      4KB

    • memory/752-62-0x0000000000C20000-0x0000000000C22000-memory.dmp
      Filesize

      8KB