Analysis

  • max time kernel
    39s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 07:16

General

  • Target

    8c2436625c255ce00d3ab1e532c3579ba515a90058b0e1a81a0e2797433dce68.exe

  • Size

    205KB

  • MD5

    9dc71e4294f156afbca0e7d8d28cdc4a

  • SHA1

    12155f83d090b889cf1353b576e47b05b2625092

  • SHA256

    8c2436625c255ce00d3ab1e532c3579ba515a90058b0e1a81a0e2797433dce68

  • SHA512

    1afae78e0cd7717ec67c1c2ac622c668949e52436570e40b0afe5903a4aa645f4d8d26d6801b6a3c7c62872e8e93fa3bbcd8482ff3da7c63572bb6e29a13a6f3

  • SSDEEP

    3072:b1dlKwgj23+Oz05YoNozcraWugB9fKGZ/8BKIRO/SRtPDvxkVHK3cpEYlak:b1dlZro5y/hWXVPSRtPzxkVq3Mwk

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1416
      • C:\Users\Admin\AppData\Local\Temp\8c2436625c255ce00d3ab1e532c3579ba515a90058b0e1a81a0e2797433dce68.exe
        "C:\Users\Admin\AppData\Local\Temp\8c2436625c255ce00d3ab1e532c3579ba515a90058b0e1a81a0e2797433dce68.exe"
        2⤵
        • Loads dropped DLL
        • NTFS ADS
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Extracted\sexy me.scr
          "C:\Extracted\sexy me.scr" /S
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1624
          • C:\Extracted\sexy me.scr
            "C:\Extracted\sexy me.scr"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1548
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:740

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Extracted\images.jpg

      Filesize

      5KB

      MD5

      1dfee4b07030347eeecd4fe6ff18c36c

      SHA1

      ba237a3cfb40e2c694e24640da4413969d4fdd5f

      SHA256

      2f6a7364fd4e0109bf0c7fd609e073e35b35df62e613e6cd94e0140f3e52c57e

      SHA512

      25e1dc9540c805e9a25797c2e6bfd7a2d17a9b232c8380593c0d79d72403353c9cc5bbb928c6ff7d1f73989fd9cb8b685f8e018e34e5bdc11aec3a76915aedc8

    • C:\Extracted\sexy me.scr

      Filesize

      118KB

      MD5

      8a074f14f04188be942f3e7f2c8b159c

      SHA1

      92f31a3401cd7a79dfc8acbb0c257602f168b8e1

      SHA256

      93cd394cd31766f2d03280aee183d0061ff266d6a09cdad8c045b56f20337694

      SHA512

      876f27a3beaa7df7ead481a6b4d21ea85e0ad68dc248bae456c11e0a5cad300c250ba52415a8f004eb04d877ae7c72a64ed0578f2493f5b4778e1de6e7af70ec

    • C:\Extracted\sexy me.scr

      Filesize

      118KB

      MD5

      8a074f14f04188be942f3e7f2c8b159c

      SHA1

      92f31a3401cd7a79dfc8acbb0c257602f168b8e1

      SHA256

      93cd394cd31766f2d03280aee183d0061ff266d6a09cdad8c045b56f20337694

      SHA512

      876f27a3beaa7df7ead481a6b4d21ea85e0ad68dc248bae456c11e0a5cad300c250ba52415a8f004eb04d877ae7c72a64ed0578f2493f5b4778e1de6e7af70ec

    • C:\Extracted\sexy me.scr

      Filesize

      118KB

      MD5

      8a074f14f04188be942f3e7f2c8b159c

      SHA1

      92f31a3401cd7a79dfc8acbb0c257602f168b8e1

      SHA256

      93cd394cd31766f2d03280aee183d0061ff266d6a09cdad8c045b56f20337694

      SHA512

      876f27a3beaa7df7ead481a6b4d21ea85e0ad68dc248bae456c11e0a5cad300c250ba52415a8f004eb04d877ae7c72a64ed0578f2493f5b4778e1de6e7af70ec

    • \Extracted\sexy me.scr

      Filesize

      118KB

      MD5

      8a074f14f04188be942f3e7f2c8b159c

      SHA1

      92f31a3401cd7a79dfc8acbb0c257602f168b8e1

      SHA256

      93cd394cd31766f2d03280aee183d0061ff266d6a09cdad8c045b56f20337694

      SHA512

      876f27a3beaa7df7ead481a6b4d21ea85e0ad68dc248bae456c11e0a5cad300c250ba52415a8f004eb04d877ae7c72a64ed0578f2493f5b4778e1de6e7af70ec

    • \Extracted\sexy me.scr

      Filesize

      118KB

      MD5

      8a074f14f04188be942f3e7f2c8b159c

      SHA1

      92f31a3401cd7a79dfc8acbb0c257602f168b8e1

      SHA256

      93cd394cd31766f2d03280aee183d0061ff266d6a09cdad8c045b56f20337694

      SHA512

      876f27a3beaa7df7ead481a6b4d21ea85e0ad68dc248bae456c11e0a5cad300c250ba52415a8f004eb04d877ae7c72a64ed0578f2493f5b4778e1de6e7af70ec

    • memory/0-64-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/0-65-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1416-74-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/1488-60-0x00000000031A0000-0x00000000031F8000-memory.dmp

      Filesize

      352KB

    • memory/1488-61-0x00000000031A0000-0x00000000031F8000-memory.dmp

      Filesize

      352KB

    • memory/1488-54-0x0000000076681000-0x0000000076683000-memory.dmp

      Filesize

      8KB

    • memory/1548-67-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1548-77-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/1548-72-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1624-62-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1624-71-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB