Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/09/2022, 16:41

General

  • Target

    c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe

  • Size

    277KB

  • MD5

    c71169080728d29c2b64742e592d59de

  • SHA1

    a53c1ff551073b5fad49dd72a1e8d85c3894f405

  • SHA256

    c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70

  • SHA512

    67d99a59f65ac710e9a15299e4c39c8249f3d5b870069f8e507087b8ac9e3a8766e7f79149ad7cfb29fb2340b05389b33e370c0a1f8ccebd138a05fee29465b3

  • SSDEEP

    3072:r54a/hIdKf8TfmRgq2QI39d7P3pjTvcEOgDX/XA4mbaARY5MTF9vKYKC1IkXuJxT:9pudlTfLF5vzA4sav5apKYKb2hfDd+T

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe
    "C:\Users\Admin\AppData\Local\Temp\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe
      "C:\Users\Admin\AppData\Local\Temp\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4468
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70" /tr "C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3540
  • C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe
    C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3796
    • C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe
      "C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe"
      2⤵
      • Executes dropped EXE
      PID:1532
  • C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe
    C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:304
    • C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe
      "C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe"
      2⤵
      • Executes dropped EXE
      PID:2708

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe.log

    Filesize

    1KB

    MD5

    08c8e9f31c97d670b3b55d9708f00f99

    SHA1

    3d260c74e6511af2c088b334aa3c4ac78d50266e

    SHA256

    bc6a45daa91bb3a1b671ff5a5103d6f376a0867fc6b4db942ccc32739907cfec

    SHA512

    f3df85cdb8c088d5fecb1e5c925ab519e8a66914b908de6df7d481ca0ca0498a67076e27e528c271400237c778eb448c01d07c43a700cb1a98e90d33c98fa170

  • C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe

    Filesize

    277KB

    MD5

    c71169080728d29c2b64742e592d59de

    SHA1

    a53c1ff551073b5fad49dd72a1e8d85c3894f405

    SHA256

    c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70

    SHA512

    67d99a59f65ac710e9a15299e4c39c8249f3d5b870069f8e507087b8ac9e3a8766e7f79149ad7cfb29fb2340b05389b33e370c0a1f8ccebd138a05fee29465b3

  • C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe

    Filesize

    277KB

    MD5

    c71169080728d29c2b64742e592d59de

    SHA1

    a53c1ff551073b5fad49dd72a1e8d85c3894f405

    SHA256

    c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70

    SHA512

    67d99a59f65ac710e9a15299e4c39c8249f3d5b870069f8e507087b8ac9e3a8766e7f79149ad7cfb29fb2340b05389b33e370c0a1f8ccebd138a05fee29465b3

  • C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe

    Filesize

    277KB

    MD5

    c71169080728d29c2b64742e592d59de

    SHA1

    a53c1ff551073b5fad49dd72a1e8d85c3894f405

    SHA256

    c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70

    SHA512

    67d99a59f65ac710e9a15299e4c39c8249f3d5b870069f8e507087b8ac9e3a8766e7f79149ad7cfb29fb2340b05389b33e370c0a1f8ccebd138a05fee29465b3

  • C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe

    Filesize

    277KB

    MD5

    c71169080728d29c2b64742e592d59de

    SHA1

    a53c1ff551073b5fad49dd72a1e8d85c3894f405

    SHA256

    c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70

    SHA512

    67d99a59f65ac710e9a15299e4c39c8249f3d5b870069f8e507087b8ac9e3a8766e7f79149ad7cfb29fb2340b05389b33e370c0a1f8ccebd138a05fee29465b3

  • C:\Users\Admin\AppData\Roaming\c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70.exe

    Filesize

    277KB

    MD5

    c71169080728d29c2b64742e592d59de

    SHA1

    a53c1ff551073b5fad49dd72a1e8d85c3894f405

    SHA256

    c174581cc24568d8536ad6b30cf6e99421af42f9905b04b3cae06505321a9d70

    SHA512

    67d99a59f65ac710e9a15299e4c39c8249f3d5b870069f8e507087b8ac9e3a8766e7f79149ad7cfb29fb2340b05389b33e370c0a1f8ccebd138a05fee29465b3

  • memory/2364-156-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-160-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-125-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-126-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-127-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-128-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-129-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-130-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-131-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-161-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-133-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-134-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-135-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-136-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-137-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-138-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-139-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-140-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-141-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-142-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-143-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-144-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-145-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-146-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-147-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-148-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-149-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-150-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-151-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-152-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-153-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-154-0x0000000000860000-0x00000000008AC000-memory.dmp

    Filesize

    304KB

  • memory/2364-155-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-123-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-157-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-158-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-124-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-159-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-132-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-162-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-163-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-164-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-165-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-166-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-167-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-168-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-169-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-170-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-171-0x00000000050D0000-0x000000000516C000-memory.dmp

    Filesize

    624KB

  • memory/2364-172-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-173-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-174-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-175-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-176-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-177-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-178-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-179-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-180-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-181-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-182-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-183-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-184-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-185-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-200-0x00000000050B0000-0x00000000050D4000-memory.dmp

    Filesize

    144KB

  • memory/2364-120-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-121-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/2364-122-0x0000000077D40000-0x0000000077ECE000-memory.dmp

    Filesize

    1.6MB

  • memory/4468-238-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/4468-241-0x0000000005A80000-0x0000000005F7E000-memory.dmp

    Filesize

    5.0MB

  • memory/4468-291-0x0000000006540000-0x00000000065A6000-memory.dmp

    Filesize

    408KB