Analysis

  • max time kernel
    160s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    28-01-2022 13:34

General

  • Target

    01/2015.5.27/07.exe

  • Size

    180KB

  • MD5

    6b0b9ad0c784552500e86aba824c0aaf

  • SHA1

    1f571f395edc5722cb80bfd3e2f39730876a1019

  • SHA256

    233aa10f5c89d48d93c689c7593bba95e29bc570e2819317d4863471ecf2dc02

  • SHA512

    7259a760c5a4b9a24f698ae9239a417a5818b0195c32d06db61acda804817aa1063d499f93e58d3a0a4827d5c32f9982d3c5809a1cb738962cb65f0c0c41b81a

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\01\2015.5.27\07.exe
    "C:\Users\Admin\AppData\Local\Temp\01\2015.5.27\07.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    PID:1732

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\acb6d2a8.dll
    MD5

    7d7191feaa71ce7537233a4226967175

    SHA1

    2a0a26313611acbd7366bcc7821c3079f3cba6de

    SHA256

    1a309d70a9fe256382bcc73866882fe6ed2be9ce223164aa4a415d06a6c7d259

    SHA512

    512e2c8f58923888c7bdad50de3da06779e2090dc491e46951b64a272b31ce4093a071ce0963d2ec79849dcefa1410970b2f59068ac3cec9647a0b15ced187dd

  • memory/1732-55-0x0000000076371000-0x0000000076373000-memory.dmp
    Filesize

    8KB

  • memory/1732-59-0x0000000000670000-0x00000000006A5000-memory.dmp
    Filesize

    212KB

  • memory/1732-60-0x0000000000230000-0x000000000024D000-memory.dmp
    Filesize

    116KB