Resubmissions

03-05-2022 13:05

220503-qbj4wafba7 8

20-04-2022 06:43

220420-hgxcdshgam 8

Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-04-2022 06:43

General

  • Target

    8fba92e7730c734197c8e5977533df77.exe

  • Size

    975KB

  • MD5

    8fba92e7730c734197c8e5977533df77

  • SHA1

    8106d808d0199d230b5943f15b1d85d05334d3ea

  • SHA256

    72cb26ac08fa4ba35112a093b506eb97f730537f9a011a20ad8049d4da6fcb77

  • SHA512

    ab1e7246e219b63b65082de10be4f6880bee0e1b04a50722bb7a1b8cfa81853a5793f581decfc43b5f1cf02d01fdd4fa3bc047cbc28afc0f37f6f87b75b397bb

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 49 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fba92e7730c734197c8e5977533df77.exe
    "C:\Users\Admin\AppData\Local\Temp\8fba92e7730c734197c8e5977533df77.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Windows\syswow64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:1728
    • C:\Windows\syswow64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Wysrrtpeu.tmp

    Filesize

    3.1MB

    MD5

    64fe5740f3dd726c1fbb9cac70e55666

    SHA1

    e2a830f232878c5da0be1795c7a4518e4ee52431

    SHA256

    ae1638c788ae8f402a7f6df7f01e8cc837206e042460309a8eca4ca9a5f83bf0

    SHA512

    727369b06dc9ec443fe60ec4033fe3a3aa278e50a841924c54dbe51fc3227be8b2bc226ffc1a19614a38c2050dfd97f6782c42003f7acc655dc785bc25a3e5fc

  • memory/1052-133-0x0000000006470000-0x0000000006536000-memory.dmp

    Filesize

    792KB

  • memory/1052-132-0x0000000003BC0000-0x0000000003C1C000-memory.dmp

    Filesize

    368KB

  • memory/1052-131-0x0000000003830000-0x0000000003861000-memory.dmp

    Filesize

    196KB

  • memory/1052-128-0x0000000006060000-0x000000000646B000-memory.dmp

    Filesize

    4.0MB

  • memory/1052-127-0x0000000003360000-0x00000000034A0000-memory.dmp

    Filesize

    1.2MB

  • memory/1052-126-0x0000000003360000-0x00000000034A0000-memory.dmp

    Filesize

    1.2MB

  • memory/1052-125-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1052-124-0x0000000002910000-0x0000000003360000-memory.dmp

    Filesize

    10.3MB

  • memory/1052-123-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/1052-121-0x0000000002910000-0x0000000003360000-memory.dmp

    Filesize

    10.3MB

  • memory/1052-120-0x00000000002C0000-0x0000000000BF0000-memory.dmp

    Filesize

    9.2MB

  • memory/1052-113-0x00000000002C0000-0x0000000000BF0000-memory.dmp

    Filesize

    9.2MB

  • memory/1728-92-0x00000000000B0000-0x00000000000B3000-memory.dmp

    Filesize

    12KB

  • memory/1728-94-0x00000000000D0000-0x00000000000D3000-memory.dmp

    Filesize

    12KB

  • memory/1728-59-0x0000000000180000-0x0000000000183000-memory.dmp

    Filesize

    12KB

  • memory/1728-61-0x0000000000180000-0x0000000000183000-memory.dmp

    Filesize

    12KB

  • memory/1728-89-0x0000000000080000-0x0000000000083000-memory.dmp

    Filesize

    12KB

  • memory/1728-90-0x0000000000090000-0x0000000000093000-memory.dmp

    Filesize

    12KB

  • memory/1728-91-0x00000000000A0000-0x00000000000A3000-memory.dmp

    Filesize

    12KB

  • memory/1728-93-0x00000000000C0000-0x00000000000C3000-memory.dmp

    Filesize

    12KB

  • memory/1872-105-0x0000000003570000-0x00000000036B0000-memory.dmp

    Filesize

    1.2MB

  • memory/1872-54-0x0000000000600000-0x00000000006C7000-memory.dmp

    Filesize

    796KB

  • memory/1872-107-0x0000000002790000-0x0000000002791000-memory.dmp

    Filesize

    4KB

  • memory/1872-109-0x0000000003570000-0x00000000036B0000-memory.dmp

    Filesize

    1.2MB

  • memory/1872-108-0x0000000003570000-0x00000000036B0000-memory.dmp

    Filesize

    1.2MB

  • memory/1872-110-0x00000000027A0000-0x00000000027A1000-memory.dmp

    Filesize

    4KB

  • memory/1872-111-0x0000000003570000-0x00000000036B0000-memory.dmp

    Filesize

    1.2MB

  • memory/1872-112-0x0000000003570000-0x00000000036B0000-memory.dmp

    Filesize

    1.2MB

  • memory/1872-104-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1872-115-0x0000000002900000-0x0000000003350000-memory.dmp

    Filesize

    10.3MB

  • memory/1872-96-0x0000000002900000-0x0000000003350000-memory.dmp

    Filesize

    10.3MB

  • memory/1872-106-0x0000000003570000-0x00000000036B0000-memory.dmp

    Filesize

    1.2MB

  • memory/1872-103-0x0000000003570000-0x00000000036B0000-memory.dmp

    Filesize

    1.2MB

  • memory/1872-101-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/1872-102-0x0000000003570000-0x00000000036B0000-memory.dmp

    Filesize

    1.2MB

  • memory/1872-100-0x0000000002900000-0x0000000003350000-memory.dmp

    Filesize

    10.3MB

  • memory/1872-99-0x00000000033E0000-0x00000000033E1000-memory.dmp

    Filesize

    4KB

  • memory/1872-97-0x0000000002900000-0x0000000003350000-memory.dmp

    Filesize

    10.3MB

  • memory/1872-58-0x0000000000400000-0x00000000005F6000-memory.dmp

    Filesize

    2.0MB

  • memory/1872-57-0x0000000001EF0000-0x00000000020DA000-memory.dmp

    Filesize

    1.9MB

  • memory/1872-56-0x0000000000600000-0x00000000006C7000-memory.dmp

    Filesize

    796KB

  • memory/1872-55-0x0000000076461000-0x0000000076463000-memory.dmp

    Filesize

    8KB