Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2022 16:55

General

  • Target

    87d5dba25f53935bcfb2d0d9d18191c9.exe

  • Size

    7.7MB

  • MD5

    87d5dba25f53935bcfb2d0d9d18191c9

  • SHA1

    d8640f67e62b90d13b1a4037471f9d232250010a

  • SHA256

    a20dcb4022a8cdfff4695d23261292891dc8dff7b695a21d8529632a35c012ea

  • SHA512

    3bd3c19195ae59899363c77e6d9689246ce152bfddde769635c5cdd2359468b5ef19720f9fad545f45f32a9e850b454c3016ef7d7c52d325c185f0bb1684933c

  • SSDEEP

    6144:H3Be8ySm8hQAAIfFrRXuEE+0l97mKwKSwHV2386JQPDHDdx/Qtqa:o/zkFF+EExZmKbSQVMPJQPDHvd

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 15 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87d5dba25f53935bcfb2d0d9d18191c9.exe
    "C:\Users\Admin\AppData\Local\Temp\87d5dba25f53935bcfb2d0d9d18191c9.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1132
    • C:\Users\Admin\AppData\Local\Temp\puvggp.exe
      "C:\Users\Admin\AppData\Local\Temp\puvggp.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • System policy modification
      PID:1924
    • C:\Users\Admin\AppData\Local\Temp\puvggp.exe
      "C:\Users\Admin\AppData\Local\Temp\puvggp.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:472

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\puvggp.exe

    Filesize

    9.8MB

    MD5

    2ac836aa6f8a749394cfdadc20c10cc7

    SHA1

    a5af3734ec70112cedc6d0a828bd30e4d332a756

    SHA256

    19410086d99f70a081df2b925c2a3bf8a6f5fe9b4d324b3a40e19ad28a24e760

    SHA512

    62fbb3878e6dd0ccccb8c13a47335ce17d6871c83e9a9071d44800f03eb18ccdde3d3ef27252931653729bf6ba839ca725971182ab95c39f1fb8261c6bf5682b

  • C:\Users\Admin\AppData\Local\Temp\puvggp.exe

    Filesize

    9.8MB

    MD5

    2ac836aa6f8a749394cfdadc20c10cc7

    SHA1

    a5af3734ec70112cedc6d0a828bd30e4d332a756

    SHA256

    19410086d99f70a081df2b925c2a3bf8a6f5fe9b4d324b3a40e19ad28a24e760

    SHA512

    62fbb3878e6dd0ccccb8c13a47335ce17d6871c83e9a9071d44800f03eb18ccdde3d3ef27252931653729bf6ba839ca725971182ab95c39f1fb8261c6bf5682b

  • \Users\Admin\AppData\Local\Temp\puvggp.exe

    Filesize

    9.8MB

    MD5

    2ac836aa6f8a749394cfdadc20c10cc7

    SHA1

    a5af3734ec70112cedc6d0a828bd30e4d332a756

    SHA256

    19410086d99f70a081df2b925c2a3bf8a6f5fe9b4d324b3a40e19ad28a24e760

    SHA512

    62fbb3878e6dd0ccccb8c13a47335ce17d6871c83e9a9071d44800f03eb18ccdde3d3ef27252931653729bf6ba839ca725971182ab95c39f1fb8261c6bf5682b

  • \Users\Admin\AppData\Local\Temp\puvggp.exe

    Filesize

    9.8MB

    MD5

    2ac836aa6f8a749394cfdadc20c10cc7

    SHA1

    a5af3734ec70112cedc6d0a828bd30e4d332a756

    SHA256

    19410086d99f70a081df2b925c2a3bf8a6f5fe9b4d324b3a40e19ad28a24e760

    SHA512

    62fbb3878e6dd0ccccb8c13a47335ce17d6871c83e9a9071d44800f03eb18ccdde3d3ef27252931653729bf6ba839ca725971182ab95c39f1fb8261c6bf5682b

  • \Users\Admin\AppData\Local\Temp\puvggp.exe

    Filesize

    9.8MB

    MD5

    2ac836aa6f8a749394cfdadc20c10cc7

    SHA1

    a5af3734ec70112cedc6d0a828bd30e4d332a756

    SHA256

    19410086d99f70a081df2b925c2a3bf8a6f5fe9b4d324b3a40e19ad28a24e760

    SHA512

    62fbb3878e6dd0ccccb8c13a47335ce17d6871c83e9a9071d44800f03eb18ccdde3d3ef27252931653729bf6ba839ca725971182ab95c39f1fb8261c6bf5682b

  • \Users\Admin\AppData\Local\Temp\puvggp.exe

    Filesize

    9.8MB

    MD5

    2ac836aa6f8a749394cfdadc20c10cc7

    SHA1

    a5af3734ec70112cedc6d0a828bd30e4d332a756

    SHA256

    19410086d99f70a081df2b925c2a3bf8a6f5fe9b4d324b3a40e19ad28a24e760

    SHA512

    62fbb3878e6dd0ccccb8c13a47335ce17d6871c83e9a9071d44800f03eb18ccdde3d3ef27252931653729bf6ba839ca725971182ab95c39f1fb8261c6bf5682b

  • memory/472-62-0x0000000000000000-mapping.dmp

  • memory/472-92-0x0000000073E21000-0x0000000073E23000-memory.dmp

    Filesize

    8KB

  • memory/1132-54-0x0000000075561000-0x0000000075563000-memory.dmp

    Filesize

    8KB

  • memory/1132-65-0x00000000742C1000-0x00000000742C3000-memory.dmp

    Filesize

    8KB

  • memory/1924-57-0x0000000000000000-mapping.dmp

  • memory/1924-66-0x0000000074161000-0x0000000074163000-memory.dmp

    Filesize

    8KB

  • memory/1924-67-0x00000000741B1000-0x00000000741B3000-memory.dmp

    Filesize

    8KB

  • memory/1924-68-0x0000000073F91000-0x0000000073F93000-memory.dmp

    Filesize

    8KB

  • memory/1924-71-0x0000000074181000-0x0000000074183000-memory.dmp

    Filesize

    8KB

  • memory/1924-72-0x0000000073F91000-0x0000000073F93000-memory.dmp

    Filesize

    8KB

  • memory/1924-73-0x0000000073E21000-0x0000000073E23000-memory.dmp

    Filesize

    8KB