Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 00:29

General

  • Target

    setup_rPDgtVNv.exe

  • Size

    104KB

  • MD5

    ef1f98c1f03a67b6e1ae3daccd8b47b8

  • SHA1

    b62eeb097bf11dea4b05a12a13fe974578875284

  • SHA256

    63503a564e42c8371e658942e1c6ca64b93079473bc83ff9d5f4199339b63e0c

  • SHA512

    8fc07de48c3f90887545bdad24efc993ee079f0567edcc7523c227868f6ba090dd40b993cd3b754903f66451f0c5d504e04770b10f1e02adc46b273860104c6e

  • SSDEEP

    1536:m0MzXa0A6ZJDQ43we4B5jyLs0EjHEX6AfHKhIEB1/IY25DmQI:tQK9CM470JyaHEX6AfKKEBWJDmQI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 60 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_rPDgtVNv.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_rPDgtVNv.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
      • Deletes itself
      PID:1832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

    Filesize

    386B

    MD5

    ca40654b10bc8da9d856556e8a3904cc

    SHA1

    192d4d2f1f7f9980645a72a6e362f597a90b0abf

    SHA256

    99f8fc55bea81acf8a2fc454ede9d6536f7dd110a0e3ec7b5db3a1acc1dbdbb2

    SHA512

    067e8161ff81a4b4dec12c07d64b58034988f8d0dccc0d99103db5e130bd6773dd09cbc4c82a959804e3c2f56074af0cee9d9d0a2cd743f73e5b2f7c366eb39a

  • memory/1652-54-0x00000000758C1000-0x00000000758C3000-memory.dmp

    Filesize

    8KB

  • memory/1832-57-0x0000000000000000-mapping.dmp