Analysis

  • max time kernel
    152s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    09/06/2022, 13:17

General

  • Target

    4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe

  • Size

    604KB

  • MD5

    19d4a9aee1841e3aee35e115fe81b6ab

  • SHA1

    60e5b623e0daf88daaa3f599f19f6a28338280f6

  • SHA256

    4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5

  • SHA512

    7c2a6e1d5aeeec88c043b62a3cbd61997da0fccaea3c6ea292ab4183bde631148e433aa160fc2551f1d01dea85bdf2cd7ced683c35e16c8a549dfd5adee7a391

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe
    "C:\Users\Admin\AppData\Local\Temp\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Users\Admin\AppData\Local\Temp\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe
      "C:\Users\Admin\AppData\Local\Temp\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1552
      • C:\Users\Admin\AppData\Local\Temp\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe
        "C:\Users\Admin\AppData\Local\Temp\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Users\Admin\AppData\Local\Temp\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe
          "C:\Users\Admin\AppData\Local\Temp\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe"
          4⤵
            PID:360
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe"
          3⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:836
          • C:\Windows\SysWOW64\PING.EXE
            ping 1.1.1.1 -n 1 -w 1000
            4⤵
            • Runs ping.exe
            PID:1768

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe

      Filesize

      604KB

      MD5

      19d4a9aee1841e3aee35e115fe81b6ab

      SHA1

      60e5b623e0daf88daaa3f599f19f6a28338280f6

      SHA256

      4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5

      SHA512

      7c2a6e1d5aeeec88c043b62a3cbd61997da0fccaea3c6ea292ab4183bde631148e433aa160fc2551f1d01dea85bdf2cd7ced683c35e16c8a549dfd5adee7a391

    • C:\Users\Admin\AppData\Local\Temp\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe

      Filesize

      604KB

      MD5

      19d4a9aee1841e3aee35e115fe81b6ab

      SHA1

      60e5b623e0daf88daaa3f599f19f6a28338280f6

      SHA256

      4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5

      SHA512

      7c2a6e1d5aeeec88c043b62a3cbd61997da0fccaea3c6ea292ab4183bde631148e433aa160fc2551f1d01dea85bdf2cd7ced683c35e16c8a549dfd5adee7a391

    • \Users\Admin\AppData\Local\Temp\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe

      Filesize

      604KB

      MD5

      19d4a9aee1841e3aee35e115fe81b6ab

      SHA1

      60e5b623e0daf88daaa3f599f19f6a28338280f6

      SHA256

      4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5

      SHA512

      7c2a6e1d5aeeec88c043b62a3cbd61997da0fccaea3c6ea292ab4183bde631148e433aa160fc2551f1d01dea85bdf2cd7ced683c35e16c8a549dfd5adee7a391

    • \Users\Admin\AppData\Local\Temp\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5\4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5.exe

      Filesize

      604KB

      MD5

      19d4a9aee1841e3aee35e115fe81b6ab

      SHA1

      60e5b623e0daf88daaa3f599f19f6a28338280f6

      SHA256

      4c8721c7bcb25c52a8de36a2801cf0cb3baa5347896e1587d0679892255907b5

      SHA512

      7c2a6e1d5aeeec88c043b62a3cbd61997da0fccaea3c6ea292ab4183bde631148e433aa160fc2551f1d01dea85bdf2cd7ced683c35e16c8a549dfd5adee7a391

    • memory/872-54-0x00000000011A0000-0x0000000001240000-memory.dmp

      Filesize

      640KB

    • memory/872-55-0x0000000075521000-0x0000000075523000-memory.dmp

      Filesize

      8KB

    • memory/872-56-0x0000000000390000-0x00000000003A8000-memory.dmp

      Filesize

      96KB

    • memory/1552-69-0x0000000004720000-0x00000000047CE000-memory.dmp

      Filesize

      696KB

    • memory/1552-60-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1552-67-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1552-68-0x00000000003F0000-0x0000000000400000-memory.dmp

      Filesize

      64KB

    • memory/1552-70-0x0000000000470000-0x0000000000498000-memory.dmp

      Filesize

      160KB

    • memory/1552-62-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1552-57-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1552-61-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1552-65-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1552-58-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1712-76-0x00000000012B0000-0x0000000001350000-memory.dmp

      Filesize

      640KB

    • memory/1712-80-0x0000000000517000-0x000000000051C000-memory.dmp

      Filesize

      20KB

    • memory/1712-81-0x0000000000517000-0x000000000051C000-memory.dmp

      Filesize

      20KB

    • memory/1712-84-0x0000000000517000-0x000000000051C000-memory.dmp

      Filesize

      20KB

    • memory/1712-87-0x0000000000517000-0x000000000051C000-memory.dmp

      Filesize

      20KB

    • memory/1712-89-0x0000000000517000-0x000000000051C000-memory.dmp

      Filesize

      20KB