Analysis

  • max time kernel
    79s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-07-2022 04:24

General

  • Target

    41da47a170f485b14f61b095ea488d54f33a11de60afaa845c4f146c06704dd5.exe

  • Size

    1.3MB

  • MD5

    46f3cb1f7ebc3a9713e726d9506afa5f

  • SHA1

    e60ebfa3d159df9f6fd1e0bc7842bf6204477d00

  • SHA256

    41da47a170f485b14f61b095ea488d54f33a11de60afaa845c4f146c06704dd5

  • SHA512

    2cc74852fc1a58a360d7f8dbce7e369fe6924e4738234eec4c1b81b8ca494234c1fb7afa32f9825cddda04d8757da1ac02fc4b32325528bca858e266873495f8

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41da47a170f485b14f61b095ea488d54f33a11de60afaa845c4f146c06704dd5.exe
    "C:\Users\Admin\AppData\Local\Temp\41da47a170f485b14f61b095ea488d54f33a11de60afaa845c4f146c06704dd5.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\41da47a170f485b14f61b095ea488d54f33a11de60afaa845c4f146c06704dd5.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1208
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\41da47a170f485b14f61b095ea488d54f33a11de60afaa845c4f146c06704dd5.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\UtilityBeats.exe"
      2⤵
      • NTFS ADS
      PID:1108
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\UtilityBeats.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\UtilityBeats.exe
        "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\UtilityBeats.exe"
        3⤵
        • Executes dropped EXE
        PID:664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\UtilityBeats.exe

    Filesize

    1.3MB

    MD5

    46f3cb1f7ebc3a9713e726d9506afa5f

    SHA1

    e60ebfa3d159df9f6fd1e0bc7842bf6204477d00

    SHA256

    41da47a170f485b14f61b095ea488d54f33a11de60afaa845c4f146c06704dd5

    SHA512

    2cc74852fc1a58a360d7f8dbce7e369fe6924e4738234eec4c1b81b8ca494234c1fb7afa32f9825cddda04d8757da1ac02fc4b32325528bca858e266873495f8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\UtilityBeats.exe

    Filesize

    1.3MB

    MD5

    46f3cb1f7ebc3a9713e726d9506afa5f

    SHA1

    e60ebfa3d159df9f6fd1e0bc7842bf6204477d00

    SHA256

    41da47a170f485b14f61b095ea488d54f33a11de60afaa845c4f146c06704dd5

    SHA512

    2cc74852fc1a58a360d7f8dbce7e369fe6924e4738234eec4c1b81b8ca494234c1fb7afa32f9825cddda04d8757da1ac02fc4b32325528bca858e266873495f8

  • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\UtilityBeats.exe

    Filesize

    1.3MB

    MD5

    46f3cb1f7ebc3a9713e726d9506afa5f

    SHA1

    e60ebfa3d159df9f6fd1e0bc7842bf6204477d00

    SHA256

    41da47a170f485b14f61b095ea488d54f33a11de60afaa845c4f146c06704dd5

    SHA512

    2cc74852fc1a58a360d7f8dbce7e369fe6924e4738234eec4c1b81b8ca494234c1fb7afa32f9825cddda04d8757da1ac02fc4b32325528bca858e266873495f8

  • memory/664-64-0x00000000011A0000-0x00000000012F6000-memory.dmp

    Filesize

    1.3MB

  • memory/1900-54-0x0000000000B00000-0x0000000000C56000-memory.dmp

    Filesize

    1.3MB

  • memory/1900-55-0x00000000001F0000-0x0000000000214000-memory.dmp

    Filesize

    144KB

  • memory/1900-56-0x0000000076011000-0x0000000076013000-memory.dmp

    Filesize

    8KB