Analysis

  • max time kernel
    150s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    29-05-2022 18:07

General

  • Target

    ce399a2d07c0851164bd8cc9e940b84b88c43ef564846ca654df4abf36c278e6.exe

  • Size

    54KB

  • MD5

    12a470956f7437a00d7bcf47f1995ea7

  • SHA1

    7301382916d9f5274a4fb847579f75bc69c9c24b

  • SHA256

    ce399a2d07c0851164bd8cc9e940b84b88c43ef564846ca654df4abf36c278e6

  • SHA512

    3e0ed7030507d076f0578071c9a628aa625ab2bbe0134ad49634d1f72de4ddf42cb02652f6f3b3378ec1e842f109be1cc68334585a46c275c5be3e2d7a685c61

Malware Config

Signatures

  • Drops file in Drivers directory 21 IoCs
  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce399a2d07c0851164bd8cc9e940b84b88c43ef564846ca654df4abf36c278e6.exe
    "C:\Users\Admin\AppData\Local\Temp\ce399a2d07c0851164bd8cc9e940b84b88c43ef564846ca654df4abf36c278e6.exe"
    1⤵
    • Drops file in Drivers directory
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:4800

Network

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Credential Access

Credentials in Files

1
T1081

Lateral Movement

Replication Through Removable Media

1
T1091

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\VISSHE.DLL
    Filesize

    279KB

    MD5

    7efcf0111eb7a22aec8410d6a427b328

    SHA1

    d6828e7c4fb2789da55899e69c6197eaf4017b88

    SHA256

    7a83319f41c626818556e406b5b664aa4c102cb851269e9becbe3041bde4368a

    SHA512

    c1526e7bfe3c9f5d9ea9ab0f18d555e01f107ec56123ab83b8677ac24da57e206fb02a0148d2ae08ceba6ec4c10f42a46b0093e2324c0d723f09ec1fd4f43d97

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll
    Filesize

    1.7MB

    MD5

    c606bd7c9c733dd27f74157c34e51742

    SHA1

    aab92689723449fbc3e123fb614dd536a74b74d4

    SHA256

    606390649012b31b5d83630f1186562e4b1ce4023d8870d8c29eb62e7e0769e0

    SHA512

    5f8fabe3d9753413d1aedcc76b9568c50dd25a5a6aeacd1ce88aecc28c0ba96dac80177679d380708213a0997946e49383bdaca7114c8c9526a24ed999194e38

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msvcp140.dll
    Filesize

    613KB

    MD5

    c1b066f9e3e2f3a6785161a8c7e0346a

    SHA1

    8b3b943e79c40bc81fdac1e038a276d034bbe812

    SHA256

    99e3e25cda404283fbd96b25b7683a8d213e7954674adefa2279123a8d0701fd

    SHA512

    36f9e6c86afbd80375295238b67e4f472eb86fcb84a590d8dba928d4e7a502d4f903971827fdc331353e5b3d06616664450759432fdc8d304a56e7dacb84b728