Analysis

  • max time kernel
    152s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 11:33

General

  • Target

    24f234bdcd251a6a1b67eb893a24673119b7974050ee5fb705ecede4be315b92.exe

  • Size

    2.2MB

  • MD5

    d9e39c24bfe27325ac6880dac794f584

  • SHA1

    21f53606ddc8b2e576c27c318fe2b6e1a1de6ae5

  • SHA256

    24f234bdcd251a6a1b67eb893a24673119b7974050ee5fb705ecede4be315b92

  • SHA512

    6b9d696d6dde4812e2530dfe62d3bb63b72705c8380891670300a1f36630e1f1cbf986b2571d2a3a99c049d575e8819466898414f38f5947a0ffef91115cd5c9

  • SSDEEP

    49152:yYEuESye17TR/mDsf2sa6Ppj4Hp1bhGuz2l0EsqTkQMZD8ZUMfo7d0:yYymc4DPp4HXhfq6EsqQ5wBo7d

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 36 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24f234bdcd251a6a1b67eb893a24673119b7974050ee5fb705ecede4be315b92.exe
    "C:\Users\Admin\AppData\Local\Temp\24f234bdcd251a6a1b67eb893a24673119b7974050ee5fb705ecede4be315b92.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\csrss.exe
      "C:\Windows\csrss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\csrss.exe

    Filesize

    2.2MB

    MD5

    d9e39c24bfe27325ac6880dac794f584

    SHA1

    21f53606ddc8b2e576c27c318fe2b6e1a1de6ae5

    SHA256

    24f234bdcd251a6a1b67eb893a24673119b7974050ee5fb705ecede4be315b92

    SHA512

    6b9d696d6dde4812e2530dfe62d3bb63b72705c8380891670300a1f36630e1f1cbf986b2571d2a3a99c049d575e8819466898414f38f5947a0ffef91115cd5c9

  • C:\Windows\csrss.exe

    Filesize

    2.2MB

    MD5

    d9e39c24bfe27325ac6880dac794f584

    SHA1

    21f53606ddc8b2e576c27c318fe2b6e1a1de6ae5

    SHA256

    24f234bdcd251a6a1b67eb893a24673119b7974050ee5fb705ecede4be315b92

    SHA512

    6b9d696d6dde4812e2530dfe62d3bb63b72705c8380891670300a1f36630e1f1cbf986b2571d2a3a99c049d575e8819466898414f38f5947a0ffef91115cd5c9

  • C:\Windows\winlogs.dll

    Filesize

    133B

    MD5

    9e0cd8986728211ca1ed4dc6d26c9d89

    SHA1

    741e1cffc0cf0e0093f82ac6cef954f697c04086

    SHA256

    a3a27e9b98aed4d352b7a6eb368e9c0617c47e38aefae25525bb4b192fb0aae8

    SHA512

    be2e2dde5cba993a5638b7c27766e034e0c190b57bd8dea9323c58d7f52a969002433d55f60b366718675abfd693784a227ccad57696eeb1c8256bbea8e31795

  • memory/1036-55-0x0000000000000000-mapping.dmp

  • memory/1036-60-0x0000000000400000-0x00000000006C2000-memory.dmp

    Filesize

    2.8MB

  • memory/1036-62-0x0000000000400000-0x00000000006C2000-memory.dmp

    Filesize

    2.8MB

  • memory/1344-54-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

    Filesize

    8KB

  • memory/1344-58-0x0000000000400000-0x00000000006C2000-memory.dmp

    Filesize

    2.8MB