Analysis

  • max time kernel
    140s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    16-10-2021 06:51

General

  • Target

    keygen-step-4.exe

  • Size

    4.3MB

  • MD5

    0fbf068bab86c0fa123e8211ff92ade5

  • SHA1

    7888a0db5569288d1b11b36620ede09f9401ecc8

  • SHA256

    fd12164ece518635296ebae00c8c5d063a4deb9ee781543115522741faf8df86

  • SHA512

    c8affc5c4a0f044275ef3e6b77fd05fda3ef54bd5833c13016857eb2b5f0c089ac5a10797945d48465f024a994bca43fbb1bfb7d697f69b83230cd7491ef1ba5

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\keygen-step-4.exe
    "C:\Users\Admin\AppData\Local\Temp\keygen-step-4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"
      2⤵
      • Executes dropped EXE
      PID:1612

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe
    MD5

    da3e5208d9182ffa5b46087596c64dfe

    SHA1

    4b0848af9eeb8846af0200e16243d98b4bc74cb9

    SHA256

    dd3403e0d473095cc2caebf4b0a3f82ab36574e0e7bb4fb0de5c854f78cd53ae

    SHA512

    980d06ea567591a5940c47b56a553b860bf04be673440ea31396df128bb75767e9d1eedc7f7bccd81e03575633b92b52aacbe6519b37a2d8cf70991e137f33b2

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe
    MD5

    da3e5208d9182ffa5b46087596c64dfe

    SHA1

    4b0848af9eeb8846af0200e16243d98b4bc74cb9

    SHA256

    dd3403e0d473095cc2caebf4b0a3f82ab36574e0e7bb4fb0de5c854f78cd53ae

    SHA512

    980d06ea567591a5940c47b56a553b860bf04be673440ea31396df128bb75767e9d1eedc7f7bccd81e03575633b92b52aacbe6519b37a2d8cf70991e137f33b2

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe
    MD5

    da3e5208d9182ffa5b46087596c64dfe

    SHA1

    4b0848af9eeb8846af0200e16243d98b4bc74cb9

    SHA256

    dd3403e0d473095cc2caebf4b0a3f82ab36574e0e7bb4fb0de5c854f78cd53ae

    SHA512

    980d06ea567591a5940c47b56a553b860bf04be673440ea31396df128bb75767e9d1eedc7f7bccd81e03575633b92b52aacbe6519b37a2d8cf70991e137f33b2

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe
    MD5

    da3e5208d9182ffa5b46087596c64dfe

    SHA1

    4b0848af9eeb8846af0200e16243d98b4bc74cb9

    SHA256

    dd3403e0d473095cc2caebf4b0a3f82ab36574e0e7bb4fb0de5c854f78cd53ae

    SHA512

    980d06ea567591a5940c47b56a553b860bf04be673440ea31396df128bb75767e9d1eedc7f7bccd81e03575633b92b52aacbe6519b37a2d8cf70991e137f33b2

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe
    MD5

    da3e5208d9182ffa5b46087596c64dfe

    SHA1

    4b0848af9eeb8846af0200e16243d98b4bc74cb9

    SHA256

    dd3403e0d473095cc2caebf4b0a3f82ab36574e0e7bb4fb0de5c854f78cd53ae

    SHA512

    980d06ea567591a5940c47b56a553b860bf04be673440ea31396df128bb75767e9d1eedc7f7bccd81e03575633b92b52aacbe6519b37a2d8cf70991e137f33b2

  • memory/1200-54-0x00000000751A1000-0x00000000751A3000-memory.dmp
    Filesize

    8KB

  • memory/1612-59-0x0000000000000000-mapping.dmp