Resubmissions

09-10-2021 11:54

211009-n3dp3afccm 10

07-10-2021 14:54

211007-r9wq1acef7 10

Analysis

  • max time kernel
    12s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    07-10-2021 14:54

General

  • Target

    ShippingDocs.exe

  • Size

    55KB

  • MD5

    a3e458f7e2e1f940b0c62042afe607d3

  • SHA1

    6fb0a031365530ebb273f47f034181a530e31b70

  • SHA256

    1730338ca0fbfe0985bed5638fc8599a6dd38761ab8b89e3d8a076947a320028

  • SHA512

    9d27b5a6e1086b315bb71cccca1f64e718d1815adbccde1a3483e1404ec3d5d8a6eddc90de373e362543a8db69bf5118e36fef6c8b4cc82d40a4f771b44766e8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ShippingDocs.exe
    "C:\Users\Admin\AppData\Local\Temp\ShippingDocs.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection -TraceRoute twitter.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:972
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection -TraceRoute twitter.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:684
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection -TraceRoute twitter.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    MD5

    b93aa52bc4ca9f273e364cc0bdeb6a34

    SHA1

    5643be7ea7babc96b6f58bd76d0589506fe44ab7

    SHA256

    4da7bc30657adb93765449d1c5a10a7883d06ba28bfeb9614d8f04aa1fd3303e

    SHA512

    296c7f891d00c4924438eef53259e4e3259f1b7d038278d30de03b25854b9f0e732498c780267e8128733c49cd7adaecaa6b5a93ee46dda6062a64f56e7dab35

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    MD5

    b93aa52bc4ca9f273e364cc0bdeb6a34

    SHA1

    5643be7ea7babc96b6f58bd76d0589506fe44ab7

    SHA256

    4da7bc30657adb93765449d1c5a10a7883d06ba28bfeb9614d8f04aa1fd3303e

    SHA512

    296c7f891d00c4924438eef53259e4e3259f1b7d038278d30de03b25854b9f0e732498c780267e8128733c49cd7adaecaa6b5a93ee46dda6062a64f56e7dab35

  • memory/684-61-0x0000000000000000-mapping.dmp

  • memory/684-68-0x0000000002670000-0x00000000032BA000-memory.dmp

    Filesize

    12.3MB

  • memory/684-69-0x0000000002670000-0x00000000032BA000-memory.dmp

    Filesize

    12.3MB

  • memory/684-67-0x0000000002670000-0x00000000032BA000-memory.dmp

    Filesize

    12.3MB

  • memory/972-59-0x0000000002311000-0x0000000002312000-memory.dmp

    Filesize

    4KB

  • memory/972-60-0x0000000002312000-0x0000000002314000-memory.dmp

    Filesize

    8KB

  • memory/972-58-0x0000000002310000-0x0000000002311000-memory.dmp

    Filesize

    4KB

  • memory/972-56-0x0000000000000000-mapping.dmp

  • memory/1296-64-0x0000000000000000-mapping.dmp

  • memory/1296-71-0x00000000022C1000-0x00000000022C2000-memory.dmp

    Filesize

    4KB

  • memory/1296-70-0x00000000022C0000-0x00000000022C1000-memory.dmp

    Filesize

    4KB

  • memory/1296-72-0x00000000022C2000-0x00000000022C4000-memory.dmp

    Filesize

    8KB

  • memory/1776-53-0x0000000001370000-0x0000000001371000-memory.dmp

    Filesize

    4KB

  • memory/1776-55-0x0000000076851000-0x0000000076853000-memory.dmp

    Filesize

    8KB

  • memory/1776-73-0x00000000059F0000-0x00000000059F1000-memory.dmp

    Filesize

    4KB