Analysis

  • max time kernel
    148s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12/06/2022, 18:45

General

  • Target

    1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe

  • Size

    958KB

  • MD5

    f1192a02588dfb2051b7524545a7d0f3

  • SHA1

    0569b1b17c61f8d79d207fd12433689ae386cb4f

  • SHA256

    1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

  • SHA512

    f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • NTFS ADS 7 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe
    "C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:996
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1992
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\Temp\FontCache.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Users\Admin\AppData\Local\Temp\FontCache.exe
        "C:\Users\Admin\AppData\Local\Temp\FontCache.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\FontCache.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:428
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\FontCache.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:1364
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\FontCache.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe"
          4⤵
          • NTFS ADS
          PID:296
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:480
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe"
            5⤵
            • Executes dropped EXE
            • Drops startup file
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1092
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe:Zone.Identifier"
              6⤵
              • NTFS ADS
              PID:1940
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe:Zone.Identifier"
              6⤵
              • NTFS ADS
              PID:1016
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              6⤵
                PID:1036
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 1100
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1760

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\FontCache.exe

      Filesize

      958KB

      MD5

      f1192a02588dfb2051b7524545a7d0f3

      SHA1

      0569b1b17c61f8d79d207fd12433689ae386cb4f

      SHA256

      1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

      SHA512

      f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe

      Filesize

      958KB

      MD5

      f1192a02588dfb2051b7524545a7d0f3

      SHA1

      0569b1b17c61f8d79d207fd12433689ae386cb4f

      SHA256

      1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

      SHA512

      f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe

      Filesize

      958KB

      MD5

      f1192a02588dfb2051b7524545a7d0f3

      SHA1

      0569b1b17c61f8d79d207fd12433689ae386cb4f

      SHA256

      1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

      SHA512

      f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe

      Filesize

      958KB

      MD5

      f1192a02588dfb2051b7524545a7d0f3

      SHA1

      0569b1b17c61f8d79d207fd12433689ae386cb4f

      SHA256

      1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

      SHA512

      f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe

      Filesize

      958KB

      MD5

      f1192a02588dfb2051b7524545a7d0f3

      SHA1

      0569b1b17c61f8d79d207fd12433689ae386cb4f

      SHA256

      1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

      SHA512

      f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe

      Filesize

      958KB

      MD5

      f1192a02588dfb2051b7524545a7d0f3

      SHA1

      0569b1b17c61f8d79d207fd12433689ae386cb4f

      SHA256

      1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

      SHA512

      f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe

      Filesize

      958KB

      MD5

      f1192a02588dfb2051b7524545a7d0f3

      SHA1

      0569b1b17c61f8d79d207fd12433689ae386cb4f

      SHA256

      1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

      SHA512

      f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe

      Filesize

      958KB

      MD5

      f1192a02588dfb2051b7524545a7d0f3

      SHA1

      0569b1b17c61f8d79d207fd12433689ae386cb4f

      SHA256

      1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

      SHA512

      f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe

      Filesize

      958KB

      MD5

      f1192a02588dfb2051b7524545a7d0f3

      SHA1

      0569b1b17c61f8d79d207fd12433689ae386cb4f

      SHA256

      1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

      SHA512

      f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe

      Filesize

      958KB

      MD5

      f1192a02588dfb2051b7524545a7d0f3

      SHA1

      0569b1b17c61f8d79d207fd12433689ae386cb4f

      SHA256

      1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d

      SHA512

      f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3

    • memory/944-54-0x0000000000BF0000-0x0000000000CE6000-memory.dmp

      Filesize

      984KB

    • memory/944-60-0x0000000004310000-0x000000000431C000-memory.dmp

      Filesize

      48KB

    • memory/944-58-0x00000000020F0000-0x00000000020F8000-memory.dmp

      Filesize

      32KB

    • memory/944-56-0x0000000075801000-0x0000000075803000-memory.dmp

      Filesize

      8KB

    • memory/944-55-0x0000000000980000-0x00000000009A8000-memory.dmp

      Filesize

      160KB

    • memory/1036-84-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1036-88-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1036-98-0x00000000003A0000-0x00000000003C8000-memory.dmp

      Filesize

      160KB

    • memory/1036-97-0x00000000049E0000-0x0000000004A8E000-memory.dmp

      Filesize

      696KB

    • memory/1036-80-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1036-81-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1036-83-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1036-91-0x00000000002F0000-0x0000000000300000-memory.dmp

      Filesize

      64KB

    • memory/1036-85-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1036-90-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/1092-74-0x0000000001180000-0x0000000001276000-memory.dmp

      Filesize

      984KB

    • memory/1092-79-0x0000000004A80000-0x0000000004A8C000-memory.dmp

      Filesize

      48KB

    • memory/1780-64-0x00000000010E0000-0x00000000011D6000-memory.dmp

      Filesize

      984KB