Analysis

  • max time kernel
    152s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    06-03-2022 00:23

General

  • Target

    6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe

  • Size

    2.6MB

  • MD5

    811527176b1b2357e96f357e141c7f29

  • SHA1

    8d00d383b6c4825edcf46a620d7b7a3e5f53e09d

  • SHA256

    6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9

  • SHA512

    597aaab2e64ad2917aa308d8c65811024de20eee1c3c19f624c77a62174d08fd26daf95c6e50b3e74c338fecceab466b2d84517b759f2f24cd26e4d3331bea92

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe
    "C:\Users\Admin\AppData\Local\Temp\6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe" -start
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Modifies system certificate store
      PID:1460
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
        3⤵
          PID:916
      • C:\Windows\SysWOW64\notepad.exe
        notepad.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 196
          3⤵
          • Program crash
          PID:1540

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
      MD5

      0af9873e7d694b6af100acc5d66d625f

      SHA1

      4e382572f28043136ff10d6e80f09ea2153a8ec1

      SHA256

      983ea452db6d000be67b0e2d5ddf8beb2d42454e9108adcdfec5fdb04afcdc60

      SHA512

      b8ece43a58a5004a74fc888ab9f2140f10ffbefed2bdc3e78a586aa05e396486be67f6035e1c21eff48717651647fcf107937c2365b023280faeaff719d905e7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
      MD5

      5bfa51f3a417b98e7443eca90fc94703

      SHA1

      8c015d80b8a23f780bdd215dc842b0f5551f63bd

      SHA256

      bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

      SHA512

      4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      MD5

      637481df32351129e60560d5a5c100b5

      SHA1

      a46aee6e5a4a4893fba5806bcc14fc7fb3ce80ae

      SHA256

      1f1029d94ca4656a577d554cedd79d447658f475af08620084897a5523587052

      SHA512

      604bfd0a78a57dfddd45872803501ad89491e37e89e0778b0f13644fa9164ff509955a57469dfdd65a05bbedaf0acb669f68430e84800d17efe7d360a70569e3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B1230D967FD647CD5194F3FFA6C7E7E4
      MD5

      0f96cf32580efc867ff48db74bc92e4b

      SHA1

      2d16ce1151807b1cc5445db9bd511d0a2c90cf01

      SHA256

      7176b87dd59195a7e0fb8624010b143d1ca991161748e2cd38a88a4eec91a8da

      SHA512

      9d9e74180ef53053ebcfe25dd50659b002a4422c9253b82c78804b97329b57ea1ee19edf9eadec09d45f1b034270a15a7da5e5943406415dc259ca58fa459dbe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
      MD5

      aa4b7669eef55fc7705d31672b88980d

      SHA1

      131a6930acf0f1e90ffe67faa4e68055cc525118

      SHA256

      f964c248ccfb020296430658f3cdf78b18f7904611c5a4f67ce9b3bb3c7464f8

      SHA512

      414a578a7141ac0c0b28d894ea942baee758c362aceb81724baeb59abf4d0bfc1486c7ef9206a08ffad243cb543abfe2a70947223f7a58831070734056c36cac

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
      MD5

      ddcb8409983cdf9cf3e381bd25a070fc

      SHA1

      6aa9309c0b433f48ec968c9fedab1bd6145d552a

      SHA256

      fe0990e49acba50f64cda75a7dfbe29e77a6281d503f225ab5c60318fdef1540

      SHA512

      7ec09e0380f972234d7dfdfeaecab251b2bcc7bbab4748f0c17fb08719e3973eae2a11f85ed260b5507c63a65b56c9ecde1e45720f363447208f7501b3ae032f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
      MD5

      3e06895870311b7716722f3bb9cf18b4

      SHA1

      de6be53c4b053307bedb3b7f4b7bb4c13efbefe1

      SHA256

      900f22a8c9d3404a07e777c03c6209f7700c184b4013eea2cc7625e941111239

      SHA512

      132128d9848e47d4b165dd3e1f19c60201e15fdd9eb97b5938075cf13c1dcdf4165870f0ff7b732a9d76867b5df686788298981e171958c53c0de3e24c650ada

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      a3326283c82c286ca34ef0b161fc99c0

      SHA1

      14d7904de250eaa8dbd661edb37264f05726ae05

      SHA256

      e71dd04ddb55b78cabeba8ac858b30345ea0ebfc80e506e74c302d2980218166

      SHA512

      1f0a60557071feb3461f226518f701b3cc04705696e22323730acaad7f625788c34eb10cccd7ee5e9777fedc9ec5c1b64cfd3a769c44178ef2236877d1f27965

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B1230D967FD647CD5194F3FFA6C7E7E4
      MD5

      97a4f67f315f259e81851804f14fae06

      SHA1

      1baab10f6ee68bef8fbd6b79be9eec7c9cac2ec4

      SHA256

      f88640f16ec2a7812c2e0b4ae0b890bef9196575caf3677a45648a20ebfb0588

      SHA512

      af87367a4df39335e280eab194c6c551e4fb8859b1e33ca873a0f97f07e239e8e452994484509f40a94b51200784108564c7d02de47c1b8d1fdb2af9810cb337

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
      MD5

      cfd762bef5f164d1ec326b7b8ed92b32

      SHA1

      55932afb4fac1da0cace775923596fdb07026f5a

      SHA256

      94f2c880cf84dbb75721f0018f23c85146973a638246fbdc601d1dac1745a1c7

      SHA512

      92b48086f83ba5537b24ac5ae8b6799d5b758d365ac02599e572ab522d0225c60fca1a55c7bdae4b53b3a61b4941cc815b4ac66313b8a1a092d0db3748f568b8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T7QQD7BH\AH8JJDJ1.htm
      MD5

      b1cd7c031debba3a5c77b39b6791c1a7

      SHA1

      e5d91e14e9c685b06f00e550d9e189deb2075f76

      SHA256

      57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

      SHA512

      d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe
      MD5

      811527176b1b2357e96f357e141c7f29

      SHA1

      8d00d383b6c4825edcf46a620d7b7a3e5f53e09d

      SHA256

      6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9

      SHA512

      597aaab2e64ad2917aa308d8c65811024de20eee1c3c19f624c77a62174d08fd26daf95c6e50b3e74c338fecceab466b2d84517b759f2f24cd26e4d3331bea92

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe
      MD5

      811527176b1b2357e96f357e141c7f29

      SHA1

      8d00d383b6c4825edcf46a620d7b7a3e5f53e09d

      SHA256

      6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9

      SHA512

      597aaab2e64ad2917aa308d8c65811024de20eee1c3c19f624c77a62174d08fd26daf95c6e50b3e74c338fecceab466b2d84517b759f2f24cd26e4d3331bea92

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe
      MD5

      811527176b1b2357e96f357e141c7f29

      SHA1

      8d00d383b6c4825edcf46a620d7b7a3e5f53e09d

      SHA256

      6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9

      SHA512

      597aaab2e64ad2917aa308d8c65811024de20eee1c3c19f624c77a62174d08fd26daf95c6e50b3e74c338fecceab466b2d84517b759f2f24cd26e4d3331bea92

    • memory/536-60-0x0000000000080000-0x0000000000081000-memory.dmp
      Filesize

      4KB

    • memory/1616-55-0x0000000075F81000-0x0000000075F83000-memory.dmp
      Filesize

      8KB