Analysis

  • max time kernel
    36s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 14:19

General

  • Target

    bd20a38cf4b3c160d6a9196600d5537985c615e365190da99d4f2ec6788e48f7.exe

  • Size

    36KB

  • MD5

    933b4213300a7a93c317954b09f4e17e

  • SHA1

    2aa38c56e92a99345251f71cf470ef5f4938def9

  • SHA256

    bd20a38cf4b3c160d6a9196600d5537985c615e365190da99d4f2ec6788e48f7

  • SHA512

    5742c6f366e12b4a9c2f244b62709abaf2b8ebd8ed3b3334faba75fa4631257cf42bd4a514c3ff0f2e19dd6a0eeba70d8a677c471d166d1a4d9dd7091836a624

  • SSDEEP

    768:GRcetMCMx3EY9KP5mP3KASn6kSEB3bNzIkLyrSG7Q:hicPEhmPn85NDLyrx7Q

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 51 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd20a38cf4b3c160d6a9196600d5537985c615e365190da99d4f2ec6788e48f7.exe
    "C:\Users\Admin\AppData\Local\Temp\bd20a38cf4b3c160d6a9196600d5537985c615e365190da99d4f2ec6788e48f7.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /u /s CPV6.dll
      2⤵
        PID:1708
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /s CPV7.dll
        2⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies registry class
        PID:1860

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\CPV\CPV7.dll

      Filesize

      50KB

      MD5

      58bb18142ea3738a44e2720224b3ed7a

      SHA1

      46bf897609e472bbdc61bda2a0a619c2019ea4c4

      SHA256

      3255bc73fdeb71c116514d34e89f1e1af8387f36f1c0413531b23b61a9193fcf

      SHA512

      10f32dbfd8664972ea1c493440a23d25cd1eca3910d93fa3c2764f69e0c2856f4307dda22c4f322c250844a1a0c43ddd3709e58dafba3d1e663b25d9b220a5f6

    • \Program Files (x86)\CPV\CPV7.dll

      Filesize

      50KB

      MD5

      58bb18142ea3738a44e2720224b3ed7a

      SHA1

      46bf897609e472bbdc61bda2a0a619c2019ea4c4

      SHA256

      3255bc73fdeb71c116514d34e89f1e1af8387f36f1c0413531b23b61a9193fcf

      SHA512

      10f32dbfd8664972ea1c493440a23d25cd1eca3910d93fa3c2764f69e0c2856f4307dda22c4f322c250844a1a0c43ddd3709e58dafba3d1e663b25d9b220a5f6

    • memory/1612-54-0x0000000076681000-0x0000000076683000-memory.dmp

      Filesize

      8KB