Analysis

  • max time kernel
    40s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2022, 09:29

General

  • Target

    82abb3648ac3b46ce91801ae3d7bb2bc.exe

  • Size

    648KB

  • MD5

    82abb3648ac3b46ce91801ae3d7bb2bc

  • SHA1

    52fd2d372bc658b40d87ea78d8eb3844128d022f

  • SHA256

    4acdef5bab397d24a91955f07803c10089bf24d570159f779284408f3a2d1141

  • SHA512

    3b2685509eeb8ef519fc04ead0ce9c7c195ebb4d6e688bf057e9356650299063af94eb94db5cf93fe946dd79c47d46e86ce286a55bce0d89d0036b49f389ca26

  • SSDEEP

    12288:nTcFngzqfSbTPw9/A813WS8UgjCSxAO9nax5+4LFJswwwUkVDTOQe:TcVkKSbTI948dWS81VaD5+KJswwwUkV6

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82abb3648ac3b46ce91801ae3d7bb2bc.exe
    "C:\Users\Admin\AppData\Local\Temp\82abb3648ac3b46ce91801ae3d7bb2bc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\7zS0E510F2C\FME.exe
      .\FME.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:696
      • C:\Users\Admin\AppData\Local\Temp\7zS0E510F2C\7zS0E510F2C.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS0E510F2C\7zS0E510F2C.exe" "C:\Users\Admin\AppData\Local\Temp\7zS0E510F2C"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:520
        • C:\Users\Admin\AppData\Roaming\FMEV2\FME.exe
          "C:\Users\Admin\AppData\Roaming\FMEV2\FME.exe" /f "\\.\pipe\AHKGLHLLJAL" "C:\Users\Admin\AppData\Local\Temp\7zS0E510F2C"
          4⤵
          • Executes dropped EXE
          • Modifies Internet Explorer settings
          • NTFS ADS
          • Suspicious use of SetWindowsHookEx
          PID:272

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS0E510F2C\7zS0E510F2C.exe

    Filesize

    1.2MB

    MD5

    b54db15d63a62135e062d1fe6c976e48

    SHA1

    b5c953eb6b587b0c4754c3913941ecd20a9ed634

    SHA256

    76881d20515d3d80564c7a9b929478183a6fe1a18324a549a330d69f9ca829e3

    SHA512

    51b8ab9753d144760bcc2a76f9283b6b92d105e3ea25dba9fd11c3da3caed2c7154cd633f83c0d6f3b48327f3dc2f11767ce139d0fe1b992a3cf2919fcdb037f

  • C:\Users\Admin\AppData\Local\Temp\7zS0E510F2C\7zS0E510F2C.exe

    Filesize

    1.2MB

    MD5

    b54db15d63a62135e062d1fe6c976e48

    SHA1

    b5c953eb6b587b0c4754c3913941ecd20a9ed634

    SHA256

    76881d20515d3d80564c7a9b929478183a6fe1a18324a549a330d69f9ca829e3

    SHA512

    51b8ab9753d144760bcc2a76f9283b6b92d105e3ea25dba9fd11c3da3caed2c7154cd633f83c0d6f3b48327f3dc2f11767ce139d0fe1b992a3cf2919fcdb037f

  • C:\Users\Admin\AppData\Local\Temp\7zS0E510F2C\FME.ahk

    Filesize

    3KB

    MD5

    8fe87b732781c30e1f207307d691cb5b

    SHA1

    bc2d9d8d13a057b906b21b5ff972db62f50d178b

    SHA256

    428b1158b162d0c1d964363f2161cd27e88c778529346abd3362074ca1ebbe0a

    SHA512

    c81edb9f06996e1efd855ab5ac16317f102b4c134714f6c9ffe09252b31ade282fc1327287cfc975972d2f7f38d9764f715e4a34bd289320ad487e2c38c5b192

  • C:\Users\Admin\AppData\Local\Temp\7zS0E510F2C\FME.exe

    Filesize

    1.4MB

    MD5

    faf97b20932d084c24a9a8fedbe7c411

    SHA1

    916450cc9f7849d473ff43d2efcb407b91cd1032

    SHA256

    b4315573d40c93f155eb468ca03caf7c6bf9c86f58c3856afa7069bd23dbe684

    SHA512

    c089447d455d5a157df565f1d2f0ce279927f1f0dc0c4f0c596b3369ebe7177aee90d8bf490384d1dcdfde048cb12b3d68213fd5f920a5cc3a702f7dc0fdd7f2

  • C:\Users\Admin\AppData\Local\Temp\7zS0E510F2C\FME.exe

    Filesize

    1.4MB

    MD5

    faf97b20932d084c24a9a8fedbe7c411

    SHA1

    916450cc9f7849d473ff43d2efcb407b91cd1032

    SHA256

    b4315573d40c93f155eb468ca03caf7c6bf9c86f58c3856afa7069bd23dbe684

    SHA512

    c089447d455d5a157df565f1d2f0ce279927f1f0dc0c4f0c596b3369ebe7177aee90d8bf490384d1dcdfde048cb12b3d68213fd5f920a5cc3a702f7dc0fdd7f2

  • C:\Users\Admin\AppData\Local\Temp\7zS0E510F2C\file

    Filesize

    1.2MB

    MD5

    7ca945d0dda3bd9ae58f2299ff4b4777

    SHA1

    708b17203c6adfa657cc7c0dfacc506f02a74d3c

    SHA256

    e08601be80508225001dc527f8f1ba9e600effd3f571c17166963da77859c0a5

    SHA512

    d53c027b4c1327c15cf3e3f32252a41bb32645772e68c5e46f9637150898d637695c37503bc3ecc7be6fbae1baefdeb83a47d3abebdb6639372b4f7b111bfa12

  • C:\Users\Admin\AppData\Roaming\FMEV2\FME.exe

    Filesize

    1.4MB

    MD5

    faf97b20932d084c24a9a8fedbe7c411

    SHA1

    916450cc9f7849d473ff43d2efcb407b91cd1032

    SHA256

    b4315573d40c93f155eb468ca03caf7c6bf9c86f58c3856afa7069bd23dbe684

    SHA512

    c089447d455d5a157df565f1d2f0ce279927f1f0dc0c4f0c596b3369ebe7177aee90d8bf490384d1dcdfde048cb12b3d68213fd5f920a5cc3a702f7dc0fdd7f2

  • C:\Users\Admin\AppData\Roaming\FMEV2\FME.exe

    Filesize

    1.4MB

    MD5

    faf97b20932d084c24a9a8fedbe7c411

    SHA1

    916450cc9f7849d473ff43d2efcb407b91cd1032

    SHA256

    b4315573d40c93f155eb468ca03caf7c6bf9c86f58c3856afa7069bd23dbe684

    SHA512

    c089447d455d5a157df565f1d2f0ce279927f1f0dc0c4f0c596b3369ebe7177aee90d8bf490384d1dcdfde048cb12b3d68213fd5f920a5cc3a702f7dc0fdd7f2

  • C:\Users\Admin\AppData\Roaming\FMEV2\FME.json

    Filesize

    7KB

    MD5

    9ee6dbeae32ced31e75e3d9f09c1010c

    SHA1

    2d779cf8e32e715fe3503ab57abf3fbe94121415

    SHA256

    5692b512d70f9b40505918fa2fc0fe7d4277142c2e3c4aa27189962ea542ab2a

    SHA512

    2486abc176f75301aa3be55b6508dd8d0df8c44181eba67a874d3ae11213d7cdc1172aced9fc52a1f895c484ef557add4441033654a1a7b33a234d308b243596

  • \Users\Admin\AppData\Local\Temp\7zS0E510F2C\7zS0E510F2C.exe

    Filesize

    1.2MB

    MD5

    b54db15d63a62135e062d1fe6c976e48

    SHA1

    b5c953eb6b587b0c4754c3913941ecd20a9ed634

    SHA256

    76881d20515d3d80564c7a9b929478183a6fe1a18324a549a330d69f9ca829e3

    SHA512

    51b8ab9753d144760bcc2a76f9283b6b92d105e3ea25dba9fd11c3da3caed2c7154cd633f83c0d6f3b48327f3dc2f11767ce139d0fe1b992a3cf2919fcdb037f

  • \Users\Admin\AppData\Local\Temp\7zS0E510F2C\FME.exe

    Filesize

    1.4MB

    MD5

    faf97b20932d084c24a9a8fedbe7c411

    SHA1

    916450cc9f7849d473ff43d2efcb407b91cd1032

    SHA256

    b4315573d40c93f155eb468ca03caf7c6bf9c86f58c3856afa7069bd23dbe684

    SHA512

    c089447d455d5a157df565f1d2f0ce279927f1f0dc0c4f0c596b3369ebe7177aee90d8bf490384d1dcdfde048cb12b3d68213fd5f920a5cc3a702f7dc0fdd7f2

  • \Users\Admin\AppData\Roaming\FMEV2\FME.exe

    Filesize

    1.4MB

    MD5

    faf97b20932d084c24a9a8fedbe7c411

    SHA1

    916450cc9f7849d473ff43d2efcb407b91cd1032

    SHA256

    b4315573d40c93f155eb468ca03caf7c6bf9c86f58c3856afa7069bd23dbe684

    SHA512

    c089447d455d5a157df565f1d2f0ce279927f1f0dc0c4f0c596b3369ebe7177aee90d8bf490384d1dcdfde048cb12b3d68213fd5f920a5cc3a702f7dc0fdd7f2

  • memory/520-66-0x0000000140000000-0x00000001409C3000-memory.dmp

    Filesize

    9.8MB

  • memory/520-72-0x0000000140000000-0x00000001409C3000-memory.dmp

    Filesize

    9.8MB

  • memory/696-58-0x000007FEFC141000-0x000007FEFC143000-memory.dmp

    Filesize

    8KB

  • memory/1504-54-0x00000000768A1000-0x00000000768A3000-memory.dmp

    Filesize

    8KB