Analysis

  • max time kernel
    150s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    31-07-2022 05:36

General

  • Target

    6055e6134d3c861ef5b2e599dd87959debcc09e6855cf3c8e4d32b6255aa1f99.exe

  • Size

    179KB

  • MD5

    84f2b1ef959d96970c899e581905c333

  • SHA1

    57119042042e49e550c90a801c7ca15b8cf1b2ab

  • SHA256

    6055e6134d3c861ef5b2e599dd87959debcc09e6855cf3c8e4d32b6255aa1f99

  • SHA512

    c32903f151977a7fb624aa23639251976d10af864bd608f7a5b77ebde9cd178051529c1c0870f38a412f5e60ce97b499c20faeee2263ac70ce0ea7a675e51c29

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6055e6134d3c861ef5b2e599dd87959debcc09e6855cf3c8e4d32b6255aa1f99.exe
    "C:\Users\Admin\AppData\Local\Temp\6055e6134d3c861ef5b2e599dd87959debcc09e6855cf3c8e4d32b6255aa1f99.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Roaming\ProgramFiles(32.3u)\svchost.exe
      "C:\Users\Admin\AppData\Roaming\ProgramFiles(32.3u)\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

    Filesize

    471B

    MD5

    c8e110d4f0fa3358d71e8759b61830f1

    SHA1

    82de544c2c0f7bf30fdf2044fb047106d7b094c3

    SHA256

    e3af569ed90c5283532bdc320551d1a5d674b989f38c9421855195fe0579fb5e

    SHA512

    0ea9babc2e63eceedc9ee5d404ff47908bf8c3b8983d822a670d31f78bbff489346d8375e437436fb044af5ce17232d4ce10f2a87f007dbb6415a3c7e7133601

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66AE3BFDF94A732B262342AD2154B86E_1504CB01E15745C324D88B59ACA8C10D

    Filesize

    490B

    MD5

    8877d510e3c8d5fab1679d40884da090

    SHA1

    1d6bb8277ec519f8d3337d3786e1e1b35f818b37

    SHA256

    d00400964ebdd17939571e41935916f1bc2a0943e7614b9bf0b4397e85238d39

    SHA512

    03a10cf8691043e78ff8bdfab682da4127f2216a8d557a35c7996caf6fea232d146b2c4150b2948c564903db5b723b7a67e999aafc3b14fdf910437b9c07c715

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

    Filesize

    434B

    MD5

    19086e6c57656bc5facc8646be3e3a47

    SHA1

    3c743f7cc18da45f7953289c53aa7bca8429a5d1

    SHA256

    8b3e5ed3c72d1b56463fad2b182e98ca401cebb0beff6991a88c958ef2e64aaa

    SHA512

    7eb7b4bbe36ae6032f0e0f698a16b0f6c2675c815ad1aff9b4007dea2362e69fad810b6c5952a93f139e42887bfa50fe8beeb26edce9b6771bb3ea7ab18027ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66AE3BFDF94A732B262342AD2154B86E_1504CB01E15745C324D88B59ACA8C10D

    Filesize

    434B

    MD5

    6081063b3c4d7476b124d5966c4c2365

    SHA1

    72cf29e9f89391c90c2daa27d8968da2357c0c86

    SHA256

    8d54ebe0c361e8f2c2a435cd91b0d72a56eebdab79de040c91bdc1a158a75171

    SHA512

    62694167b61213bd4018c29c14d8c6017cbab7b7cdb942d4abc0fe9b7f439514a7e219dd656970b19874e3cb85f6c0bb9667712ddb370c7b3fd5f84b61cbef85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    3b51e162462c63c81bb4a4c01ad14259

    SHA1

    9acdccb1d3c80b72f241c85b6fa23dad054960b1

    SHA256

    cd76e8bd80a8b0ab741e20b103b6d1bb0fd598c54753accbb120c18a3a399b39

    SHA512

    bbf7c17c4722872df185eacaee6b43c022d033ecdeeab63cb90133cf1f2d8002fb0f9d4a67bc2f829e82d6a789dadfa52ba0452358077835a41a1399b1e77150

  • C:\Users\Admin\AppData\Roaming\ProgramFiles(32.3u)\svchost.exe

    Filesize

    179KB

    MD5

    84f2b1ef959d96970c899e581905c333

    SHA1

    57119042042e49e550c90a801c7ca15b8cf1b2ab

    SHA256

    6055e6134d3c861ef5b2e599dd87959debcc09e6855cf3c8e4d32b6255aa1f99

    SHA512

    c32903f151977a7fb624aa23639251976d10af864bd608f7a5b77ebde9cd178051529c1c0870f38a412f5e60ce97b499c20faeee2263ac70ce0ea7a675e51c29

  • C:\Users\Admin\AppData\Roaming\ProgramFiles(32.3u)\svchost.exe

    Filesize

    179KB

    MD5

    84f2b1ef959d96970c899e581905c333

    SHA1

    57119042042e49e550c90a801c7ca15b8cf1b2ab

    SHA256

    6055e6134d3c861ef5b2e599dd87959debcc09e6855cf3c8e4d32b6255aa1f99

    SHA512

    c32903f151977a7fb624aa23639251976d10af864bd608f7a5b77ebde9cd178051529c1c0870f38a412f5e60ce97b499c20faeee2263ac70ce0ea7a675e51c29

  • memory/1416-65-0x000007FEF3530000-0x000007FEF3F53000-memory.dmp

    Filesize

    10.1MB

  • memory/1416-66-0x000007FEEE150000-0x000007FEEF1E6000-memory.dmp

    Filesize

    16.6MB

  • memory/1416-67-0x0000000000B66000-0x0000000000B85000-memory.dmp

    Filesize

    124KB

  • memory/1416-68-0x0000000000B66000-0x0000000000B85000-memory.dmp

    Filesize

    124KB

  • memory/2012-59-0x0000000000AD6000-0x0000000000AF5000-memory.dmp

    Filesize

    124KB

  • memory/2012-54-0x000007FEF3F60000-0x000007FEF4983000-memory.dmp

    Filesize

    10.1MB

  • memory/2012-55-0x000007FEF2EC0000-0x000007FEF3F56000-memory.dmp

    Filesize

    16.6MB