Analysis

  • max time kernel
    35s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    31-08-2021 03:35

General

  • Target

    00900090KN.exe

  • Size

    529KB

  • MD5

    aaf17abfdde05c49c802f36152e7332f

  • SHA1

    96cb10637d94c28163b390d11a43a2ece002d5f0

  • SHA256

    16c87c40706e8c0eee97f32fccac2fa229961b13d266e011ce411d37b864dafa

  • SHA512

    d93fe97db4fe0ba40fc53996e01c3f72e184f3646d630064ba23f718c1f3e7e8bad78078772924147262551e8ab686ac3ef46af98ccb39cd68f1c98f82f4f5b3

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00900090KN.exe
    "C:\Users\Admin\AppData\Local\Temp\00900090KN.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:572
    • C:\Users\Admin\AppData\Local\Temp\00900090KN.exe
      "C:\Users\Admin\AppData\Local\Temp\00900090KN.exe"
      2⤵
        PID:288

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/572-59-0x00000000757C1000-0x00000000757C3000-memory.dmp

      Filesize

      8KB

    • memory/572-60-0x00000000003F0000-0x00000000003F1000-memory.dmp

      Filesize

      4KB

    • memory/572-61-0x0000000003B90000-0x0000000003B92000-memory.dmp

      Filesize

      8KB