Analysis

  • max time kernel
    4294185s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    12-03-2022 14:22

General

  • Target

    One-Page-Lease-Agreement-Texas.exe

  • Size

    261.0MB

  • MD5

    7194384ed0ce511e24b0e119d0d068f6

  • SHA1

    9ea9e3f52602988a922e8d8fda000f060be2b248

  • SHA256

    7cc35fbce4b353c541f1ee62366248cc072d1c7ce38b1d5ef5db4a2414f26e08

  • SHA512

    0faea84e368d301b7b056630b82c9f2a49f01252e66f5699ddf81f879d22fc74e08a810252e87a58cd9e5b147e9c1682678308781d08fd65e2edb2c8017c98d7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\One-Page-Lease-Agreement-Texas.exe
    "C:\Users\Admin\AppData\Local\Temp\One-Page-Lease-Agreement-Texas.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\qhjjfwcr.exe
      "C:\Users\Admin\AppData\Local\Temp\qhjjfwcr.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1748
    • C:\Users\Admin\AppData\Local\Temp\One-Page-Lease-Agreement-Texas.exe
      "C:\Users\Admin\AppData\Local\Temp\One-Page-Lease-Agreement-Texas.exe" /r
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1176 -s 592
        3⤵
        • Program crash
        PID:1616
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 89C08C382447DE4EBB0ED41BA4125F2E C
      2⤵
      • Loads dropped DLL
      PID:1916

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIB413.tmp
    MD5

    30e6c05c794e912b8f57f9c6e9449afc

    SHA1

    28a2bd4b61fafa633adad1ad0a7c8ceeaec48675

    SHA256

    5d3b2f3f1b00855aac7b95a585fa12ee532f59e06bb035efc8a20f30bfbf047d

    SHA512

    6da0d628caf6d540b8297fa9f8e7ed413c8a5a29da113d2371f3d931eebfa543842a90661e87a4517db28aca2eae429b476c540127e6ad046d31168249357d22

  • C:\Users\Admin\AppData\Local\Temp\MSIB942.tmp
    MD5

    30e6c05c794e912b8f57f9c6e9449afc

    SHA1

    28a2bd4b61fafa633adad1ad0a7c8ceeaec48675

    SHA256

    5d3b2f3f1b00855aac7b95a585fa12ee532f59e06bb035efc8a20f30bfbf047d

    SHA512

    6da0d628caf6d540b8297fa9f8e7ed413c8a5a29da113d2371f3d931eebfa543842a90661e87a4517db28aca2eae429b476c540127e6ad046d31168249357d22

  • C:\Users\Admin\AppData\Local\Temp\MSIBB27.tmp
    MD5

    75515f449d49e8f431a5cf109c603680

    SHA1

    0a32e62b50d3589cd25441ac2e463a695367da7f

    SHA256

    a0ff99c90d262e4f242b680b377dc93c6ee4fa7dd9041e7865709f3aaa1e1017

    SHA512

    8473aeb3853a0ec22a54398099b81a443bf56187257f2ca6b25f72a9ea4371cbedb671c49849d944e08849120a53e9456c2b697d3b4fdc911079e7543c2ff9c4

  • C:\Users\Admin\AppData\Local\Temp\MSIBB95.tmp
    MD5

    30e6c05c794e912b8f57f9c6e9449afc

    SHA1

    28a2bd4b61fafa633adad1ad0a7c8ceeaec48675

    SHA256

    5d3b2f3f1b00855aac7b95a585fa12ee532f59e06bb035efc8a20f30bfbf047d

    SHA512

    6da0d628caf6d540b8297fa9f8e7ed413c8a5a29da113d2371f3d931eebfa543842a90661e87a4517db28aca2eae429b476c540127e6ad046d31168249357d22

  • C:\Users\Admin\AppData\Local\Temp\qhjjfwcr.exe
    MD5

    0dae793f4d81ad44e9381ec8e017425f

    SHA1

    2908846d8d17393e4ae9a620ff6e80d039b8c4ce

    SHA256

    4f043b71d369c994a4911667829e0c7b639cd4c9929808ea6233800f21922336

    SHA512

    8df514c3009493295f70480da58decc31ab882433646843d5c3103c9a237cd1cc8d9cd64544f545adc3cd8de3c785a1cb3edc843f508357859db30f24182cda7

  • C:\Users\Admin\AppData\Local\Temp\qhjjfwcr.exe
    MD5

    0dae793f4d81ad44e9381ec8e017425f

    SHA1

    2908846d8d17393e4ae9a620ff6e80d039b8c4ce

    SHA256

    4f043b71d369c994a4911667829e0c7b639cd4c9929808ea6233800f21922336

    SHA512

    8df514c3009493295f70480da58decc31ab882433646843d5c3103c9a237cd1cc8d9cd64544f545adc3cd8de3c785a1cb3edc843f508357859db30f24182cda7

  • \Users\Admin\AppData\Local\Temp\MSIB413.tmp
    MD5

    30e6c05c794e912b8f57f9c6e9449afc

    SHA1

    28a2bd4b61fafa633adad1ad0a7c8ceeaec48675

    SHA256

    5d3b2f3f1b00855aac7b95a585fa12ee532f59e06bb035efc8a20f30bfbf047d

    SHA512

    6da0d628caf6d540b8297fa9f8e7ed413c8a5a29da113d2371f3d931eebfa543842a90661e87a4517db28aca2eae429b476c540127e6ad046d31168249357d22

  • \Users\Admin\AppData\Local\Temp\MSIB942.tmp
    MD5

    30e6c05c794e912b8f57f9c6e9449afc

    SHA1

    28a2bd4b61fafa633adad1ad0a7c8ceeaec48675

    SHA256

    5d3b2f3f1b00855aac7b95a585fa12ee532f59e06bb035efc8a20f30bfbf047d

    SHA512

    6da0d628caf6d540b8297fa9f8e7ed413c8a5a29da113d2371f3d931eebfa543842a90661e87a4517db28aca2eae429b476c540127e6ad046d31168249357d22

  • \Users\Admin\AppData\Local\Temp\MSIBB27.tmp
    MD5

    75515f449d49e8f431a5cf109c603680

    SHA1

    0a32e62b50d3589cd25441ac2e463a695367da7f

    SHA256

    a0ff99c90d262e4f242b680b377dc93c6ee4fa7dd9041e7865709f3aaa1e1017

    SHA512

    8473aeb3853a0ec22a54398099b81a443bf56187257f2ca6b25f72a9ea4371cbedb671c49849d944e08849120a53e9456c2b697d3b4fdc911079e7543c2ff9c4

  • \Users\Admin\AppData\Local\Temp\MSIBB95.tmp
    MD5

    30e6c05c794e912b8f57f9c6e9449afc

    SHA1

    28a2bd4b61fafa633adad1ad0a7c8ceeaec48675

    SHA256

    5d3b2f3f1b00855aac7b95a585fa12ee532f59e06bb035efc8a20f30bfbf047d

    SHA512

    6da0d628caf6d540b8297fa9f8e7ed413c8a5a29da113d2371f3d931eebfa543842a90661e87a4517db28aca2eae429b476c540127e6ad046d31168249357d22

  • \Users\Admin\AppData\Roaming\Free PDF Soulutions\PDF Merge 1.0.0\install\decoder.dll
    MD5

    0dbb6ca9af2cb9b585f814a3ca4b49ad

    SHA1

    25692b7117913b96631c3f9a2fe19833c7bbe63c

    SHA256

    9f3a6b5eb8785436618c153cdce216e2bd80c54f23c45b2a7e48db2c0b01c685

    SHA512

    6c399d0fd96558e6e7be61bd8c58e32771a8f85db947bd9a31cada9c7f8f0a552f24d2c78c282df46ded4fc1189cee61e6a54f54a8245b1f7f7a104821c00680

  • \Users\Admin\AppData\Roaming\Free PDF Soulutions\PDF Merge 1.0.0\install\decoder.dll
    MD5

    0dbb6ca9af2cb9b585f814a3ca4b49ad

    SHA1

    25692b7117913b96631c3f9a2fe19833c7bbe63c

    SHA256

    9f3a6b5eb8785436618c153cdce216e2bd80c54f23c45b2a7e48db2c0b01c685

    SHA512

    6c399d0fd96558e6e7be61bd8c58e32771a8f85db947bd9a31cada9c7f8f0a552f24d2c78c282df46ded4fc1189cee61e6a54f54a8245b1f7f7a104821c00680

  • memory/432-66-0x000007FEFC121000-0x000007FEFC123000-memory.dmp
    Filesize

    8KB

  • memory/1176-60-0x000000001B2F0000-0x000000001B2F2000-memory.dmp
    Filesize

    8KB

  • memory/1176-59-0x000007FEF58E0000-0x000007FEF62CC000-memory.dmp
    Filesize

    9.9MB

  • memory/1268-54-0x000007FEF58E0000-0x000007FEF62CC000-memory.dmp
    Filesize

    9.9MB

  • memory/1268-56-0x000000001B170000-0x000000001B172000-memory.dmp
    Filesize

    8KB

  • memory/1268-55-0x0000000000AF0000-0x0000000000F98000-memory.dmp
    Filesize

    4.7MB

  • memory/1748-63-0x0000000074881000-0x0000000074883000-memory.dmp
    Filesize

    8KB

  • memory/1748-62-0x0000000000520000-0x0000000000521000-memory.dmp
    Filesize

    4KB

  • memory/1748-58-0x0000000075A31000-0x0000000075A33000-memory.dmp
    Filesize

    8KB