Analysis

  • max time kernel
    4294180s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    25/03/2022, 21:48

General

  • Target

    3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe

  • Size

    1.5MB

  • MD5

    764cae302cdcf344a2be7b2eb195bc6d

  • SHA1

    50b434aa5b6268d94f0f607b17c3ad90b56d5f49

  • SHA256

    3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79

  • SHA512

    88c9d18a56fbe5e7402e61d481807295b24c6c0c2f0d154112a734a9353f96d7568e102105df8dfdfbe1aefdc82894e67e242d2db979662fb87af47186331dc9

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe
    "C:\Users\Admin\AppData\Local\Temp\3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:576
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\RECEIPT.bmp
      2⤵
        PID:2016
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:1480

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/576-56-0x0000000075471000-0x0000000075473000-memory.dmp

      Filesize

      8KB

    • memory/1480-110-0x00000000001B0000-0x00000000001B2000-memory.dmp

      Filesize

      8KB

    • memory/2016-109-0x0000000000660000-0x0000000000662000-memory.dmp

      Filesize

      8KB