Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 09:25

General

  • Target

    7a5068443ed1dc0395adc88b8beb98bbb735af2e5174e589698b35a74f2a61e3.exe

  • Size

    92KB

  • MD5

    1faf1a6d11f930ab4f368e71a3a23c2b

  • SHA1

    e1475f36999b135811261d2295cca7c3a900271b

  • SHA256

    7a5068443ed1dc0395adc88b8beb98bbb735af2e5174e589698b35a74f2a61e3

  • SHA512

    d5a843c6c2245e5e7619632f4fd7db97bea54df9af9d02279801fd58d6fd7caf15f99dbfbeee4902578100140115bcde3daa573c8b4f9d64cfbf5d9511f21ccf

  • SSDEEP

    768:fGTkFdPGWIn0cN6lfypHb3Pb9XbxPhCgvmC3emu4v/eo4z7VP7LdGSu2HyTAzfMA:4UGRmYf1Hg354vM

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a5068443ed1dc0395adc88b8beb98bbb735af2e5174e589698b35a74f2a61e3.exe
    "C:\Users\Admin\AppData\Local\Temp\7a5068443ed1dc0395adc88b8beb98bbb735af2e5174e589698b35a74f2a61e3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1776
    • \??\c:\windows\system\alg.exe
      c:\windows\system\alg.exe
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\temp\*.* /q /s
        3⤵
          PID:1364
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\7A5068~1.EXE > nul
        2⤵
        • Deletes itself
        PID:1472

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\system\alg.exe

      Filesize

      92KB

      MD5

      1faf1a6d11f930ab4f368e71a3a23c2b

      SHA1

      e1475f36999b135811261d2295cca7c3a900271b

      SHA256

      7a5068443ed1dc0395adc88b8beb98bbb735af2e5174e589698b35a74f2a61e3

      SHA512

      d5a843c6c2245e5e7619632f4fd7db97bea54df9af9d02279801fd58d6fd7caf15f99dbfbeee4902578100140115bcde3daa573c8b4f9d64cfbf5d9511f21ccf

    • \??\c:\windows\system\alg.exe

      Filesize

      92KB

      MD5

      1faf1a6d11f930ab4f368e71a3a23c2b

      SHA1

      e1475f36999b135811261d2295cca7c3a900271b

      SHA256

      7a5068443ed1dc0395adc88b8beb98bbb735af2e5174e589698b35a74f2a61e3

      SHA512

      d5a843c6c2245e5e7619632f4fd7db97bea54df9af9d02279801fd58d6fd7caf15f99dbfbeee4902578100140115bcde3daa573c8b4f9d64cfbf5d9511f21ccf

    • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

      Filesize

      145KB

      MD5

      9d10f99a6712e28f8acd5641e3a7ea6b

      SHA1

      835e982347db919a681ba12f3891f62152e50f0d

      SHA256

      70964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc

      SHA512

      2141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5

    • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

      Filesize

      1.0MB

      MD5

      4d92f518527353c0db88a70fddcfd390

      SHA1

      c4baffc19e7d1f0e0ebf73bab86a491c1d152f98

      SHA256

      97e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c

      SHA512

      05a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452

    • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE

      Filesize

      818KB

      MD5

      a41e524f8d45f0074fd07805ff0c9b12

      SHA1

      948deacf95a60c3fdf17e0e4db1931a6f3fc5d38

      SHA256

      082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7

      SHA512

      91bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f

    • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe

      Filesize

      507KB

      MD5

      c87e561258f2f8650cef999bf643a731

      SHA1

      2c64b901284908e8ed59cf9c912f17d45b05e0af

      SHA256

      a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b

      SHA512

      dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c

    • \Windows\system\alg.exe

      Filesize

      92KB

      MD5

      1faf1a6d11f930ab4f368e71a3a23c2b

      SHA1

      e1475f36999b135811261d2295cca7c3a900271b

      SHA256

      7a5068443ed1dc0395adc88b8beb98bbb735af2e5174e589698b35a74f2a61e3

      SHA512

      d5a843c6c2245e5e7619632f4fd7db97bea54df9af9d02279801fd58d6fd7caf15f99dbfbeee4902578100140115bcde3daa573c8b4f9d64cfbf5d9511f21ccf

    • \Windows\system\alg.exe

      Filesize

      92KB

      MD5

      1faf1a6d11f930ab4f368e71a3a23c2b

      SHA1

      e1475f36999b135811261d2295cca7c3a900271b

      SHA256

      7a5068443ed1dc0395adc88b8beb98bbb735af2e5174e589698b35a74f2a61e3

      SHA512

      d5a843c6c2245e5e7619632f4fd7db97bea54df9af9d02279801fd58d6fd7caf15f99dbfbeee4902578100140115bcde3daa573c8b4f9d64cfbf5d9511f21ccf

    • memory/1144-72-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1144-65-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1776-63-0x00000000001B0000-0x00000000001CB000-memory.dmp

      Filesize

      108KB

    • memory/1776-67-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1776-62-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1776-54-0x0000000074C91000-0x0000000074C93000-memory.dmp

      Filesize

      8KB

    • memory/1776-64-0x00000000001B0000-0x00000000001CB000-memory.dmp

      Filesize

      108KB