Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 11:33

General

  • Target

    c61d23e3bdfd9f6d05583e25c98a24f3313e93d77b47d09f06aa2166752e3c3a.exe

  • Size

    21KB

  • MD5

    14303216a7dedb014985b13c58308e73

  • SHA1

    e1553ed898d1e0aa170573b0d3dda1c181b1928c

  • SHA256

    c61d23e3bdfd9f6d05583e25c98a24f3313e93d77b47d09f06aa2166752e3c3a

  • SHA512

    bd16d8242f3d71c7749060fc134563be7b9e27ab08dce100aa0f3073ed4f28f21c0112c9223e5e3ed3c66338771c861feb05c52c7376581c6e1398fd14a2ec54

  • SSDEEP

    384:nshUHuAdwb492W08W8OY2CWNZ597y68iYf1HRjkzgQJd1Axzr6+S9Pfu7n5c:nmUHuzz8W8ByZj7y68vVRjkzgQKxKdeG

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs regedit.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c61d23e3bdfd9f6d05583e25c98a24f3313e93d77b47d09f06aa2166752e3c3a.exe
    "C:\Users\Admin\AppData\Local\Temp\c61d23e3bdfd9f6d05583e25c98a24f3313e93d77b47d09f06aa2166752e3c3a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Program Files\Common Files\System\smss.exe
      "C:\Program Files\Common Files\System\smss.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Windows\SysWOW64\REGEDIT.exe
        REGEDIT /S "C:\Program Files\Common Files\System\start.bat"
        3⤵
        • Adds Run key to start application
        • Runs regedit.exe
        PID:704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\System\smss.exe

    Filesize

    21KB

    MD5

    14303216a7dedb014985b13c58308e73

    SHA1

    e1553ed898d1e0aa170573b0d3dda1c181b1928c

    SHA256

    c61d23e3bdfd9f6d05583e25c98a24f3313e93d77b47d09f06aa2166752e3c3a

    SHA512

    bd16d8242f3d71c7749060fc134563be7b9e27ab08dce100aa0f3073ed4f28f21c0112c9223e5e3ed3c66338771c861feb05c52c7376581c6e1398fd14a2ec54

  • C:\Program Files\Common Files\System\smss.exe

    Filesize

    21KB

    MD5

    14303216a7dedb014985b13c58308e73

    SHA1

    e1553ed898d1e0aa170573b0d3dda1c181b1928c

    SHA256

    c61d23e3bdfd9f6d05583e25c98a24f3313e93d77b47d09f06aa2166752e3c3a

    SHA512

    bd16d8242f3d71c7749060fc134563be7b9e27ab08dce100aa0f3073ed4f28f21c0112c9223e5e3ed3c66338771c861feb05c52c7376581c6e1398fd14a2ec54

  • C:\Program Files\Common Files\System\start.bat

    Filesize

    291B

    MD5

    239692327ed96d1d23daf92e034275d0

    SHA1

    72368106cfe3dbfa6c7c09068df12b4840a8de23

    SHA256

    b70c591470a52b92ded3a5fef8bc6cc2d0169573bb2aa53956024811c4116c3c

    SHA512

    acd5fdc14f16ee7a3f025c742f1077ac1f3459fade751790a64f7bea995195c82be48334cd27ebae5e00a79d1d6a3dbdf468dfc95eba2149b4dbc317df558067

  • \Program Files\Common Files\System\smss.exe

    Filesize

    21KB

    MD5

    14303216a7dedb014985b13c58308e73

    SHA1

    e1553ed898d1e0aa170573b0d3dda1c181b1928c

    SHA256

    c61d23e3bdfd9f6d05583e25c98a24f3313e93d77b47d09f06aa2166752e3c3a

    SHA512

    bd16d8242f3d71c7749060fc134563be7b9e27ab08dce100aa0f3073ed4f28f21c0112c9223e5e3ed3c66338771c861feb05c52c7376581c6e1398fd14a2ec54

  • \Program Files\Common Files\System\smss.exe

    Filesize

    21KB

    MD5

    14303216a7dedb014985b13c58308e73

    SHA1

    e1553ed898d1e0aa170573b0d3dda1c181b1928c

    SHA256

    c61d23e3bdfd9f6d05583e25c98a24f3313e93d77b47d09f06aa2166752e3c3a

    SHA512

    bd16d8242f3d71c7749060fc134563be7b9e27ab08dce100aa0f3073ed4f28f21c0112c9223e5e3ed3c66338771c861feb05c52c7376581c6e1398fd14a2ec54

  • memory/1248-54-0x0000000075351000-0x0000000075353000-memory.dmp

    Filesize

    8KB