Resubmissions

23-09-2021 13:59

210923-ractvaefc5 8

22-08-2021 12:44

210822-vqqzsf2ch6 10

Analysis

  • max time kernel
    133s
  • max time network
    59s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    23-09-2021 13:59

General

  • Target

    ApowerREC.exe

  • Size

    8.9MB

  • MD5

    810be064429970190268a24af354a2f1

  • SHA1

    f5e17599a9c30a9eada1dcb276b888bdeffd037d

  • SHA256

    7edf30b359be3f27c9e7313352bc2d4cccb0e36010b34633646ea4823a70a82b

  • SHA512

    d385f16cb89fff66926770768d34686963dededf2fe47cb3889fc1ab9ae791c9067b76d78d0f5b58f2a29d9bdb2e709a672d560c97cf34e1834230b322c157b0

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ApowerREC.exe
    "C:\Users\Admin\AppData\Local\Temp\ApowerREC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c
      2⤵
        PID:1140
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
          PID:1252

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/784-60-0x0000000000150000-0x0000000000151000-memory.dmp

        Filesize

        4KB

      • memory/784-62-0x0000000002700000-0x0000000002701000-memory.dmp

        Filesize

        4KB

      • memory/1140-63-0x0000000000000000-mapping.dmp

      • memory/1252-65-0x00000000005F5A70-mapping.dmp