Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2022, 04:47

General

  • Target

    96c3b4fb74592d082c307fb9ee9aecc1dd99553afb000140dff4906248f0f3b4.exe

  • Size

    699KB

  • MD5

    6b43b10b3de0e6cdc299a30c4b7c3af2

  • SHA1

    9a0f93fa091552b94632adff329c7c2686bfae33

  • SHA256

    96c3b4fb74592d082c307fb9ee9aecc1dd99553afb000140dff4906248f0f3b4

  • SHA512

    c2afb915459e2cdc0a05e8975d5719b0aeacc55f50eb110791779acb9a61f7d7c6f6be0becded2b9639197516e16ebd44953c33b34c6416436c049450c7100d2

  • SSDEEP

    12288:qPP2sGT1u2iCW0HXmD5l3ESFhOdVkRWAmAx3MMz10gLJqUZ9r:qz1H0a5lfhOzkRfmsMMZ0OJNV

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 41 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96c3b4fb74592d082c307fb9ee9aecc1dd99553afb000140dff4906248f0f3b4.exe
    "C:\Users\Admin\AppData\Local\Temp\96c3b4fb74592d082c307fb9ee9aecc1dd99553afb000140dff4906248f0f3b4.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\syswow64\VISTA64_DriverInstall.exe
      "C:\Windows\syswow64\VISTA64_DriverInstall.exe" -install
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1400
    • C:\Windows\syswow64\GP_CLT_LNCA_Service.exe
      "C:\Windows\syswow64\GP_CLT_LNCA_Service.exe" -install
      2⤵
      • Executes dropped EXE
      PID:1040
    • C:\Windows\syswow64\GP_CLT_LNCA.exe
      "C:\Windows\syswow64\GP_CLT_LNCA.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1444
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{25b8bfbd-262f-2300-7484-025961cc7064}\CIDCUSB.inf" "9" "6780558fb" "000000000000056C" "WinSta0\Default" "0000000000000328" "208" "C:\Windows\syswow64"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2000
  • C:\Windows\syswow64\GP_CLT_LNCA_Service.exe
    C:\Windows\syswow64\GP_CLT_LNCA_Service.exe
    1⤵
    • Executes dropped EXE
    PID:1988

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\{25B8B~1\CIDCUSB.sys

          Filesize

          17KB

          MD5

          796a0d08823bc9ca9b03c51137a6a676

          SHA1

          0cd0e117d3055143d3aa5ccf3bdaa036f4ff8409

          SHA256

          bd436c7e3c03c20a88807a610fe7f17e6de3e21924edc2c77834801033d8ccd4

          SHA512

          18173c0e23cadd16b905699abc413d713a4bd6f2c658befb3232a19e66207f6bfcf2f0979ac1577d68c4bf8cbc3c5ee487baeda53bdeefb1e16dc31085c40c3f

        • C:\Users\Admin\AppData\Local\Temp\{25b8bfbd-262f-2300-7484-025961cc7064}\CIDCUSB.inf

          Filesize

          7KB

          MD5

          7486da61128fc1a30aad41d28a18d6bf

          SHA1

          c8e50522236b2ef730d9e33c4956a987858efb81

          SHA256

          09678517654185d91de64ac89639a01ea8f7922c90feb9d356c708bbd8006893

          SHA512

          1a653e6a30496f810c0b7ac911adac54f0bc263a43b3b8d3ce386161c5731dca1f2d2755af3d346c9d683809a7d037950482b1303d9e8e7e69966c955ebb43d0

        • C:\Users\Admin\AppData\Local\Temp\{25b8bfbd-262f-2300-7484-025961cc7064}\cidcusb.cat

          Filesize

          11KB

          MD5

          c068d42c8140b61dce772f61786fd267

          SHA1

          8c3124a60cdbf75eb5aef874fb77905a68cce7e5

          SHA256

          3a6924b7e1268162ba801227c4cc26847e8d44025d135d81f419bc3fc60073d8

          SHA512

          14b36b5ad2900f0757af04a194c95f873c7badd8d3b943ebafc1baa868190ed4a0310c4df092833d2cd60eb247d85994764c5f1cb40730f9bd43caed9931e49d

        • C:\Windows\SysWOW64\GP_CLT_LNCA.exe

          Filesize

          236KB

          MD5

          1362d662e55d16d526c923eb11faa59e

          SHA1

          51c2932a85d1bcf08319cd58c441539d856280b2

          SHA256

          ff986fb70d1bb3b25351946d1e788d66284163234f46a33c3b80bd290565316f

          SHA512

          f83c351a03fcc76fce1ba069ca1a11d29bd5fca849008796bd3e308e9f7b059eb036dc07f43d7bf0f2d11123d81c8e11b20fdce988036c552978184fcc670642

        • C:\Windows\SysWOW64\GP_CLT_LNCA_Service.exe

          Filesize

          24KB

          MD5

          117637bf8e49ceac11dd381cb4b0f703

          SHA1

          77e9f575cb4f93d914c9371a53d6dfd2e61ce218

          SHA256

          82ddc3f2363c24cdd5550223a6686a3c0622692a2337a18a15a2d2bf95fc11f5

          SHA512

          f7ba0b208e77ae05158d6a3e5c1d8fd82c62c47a4f61e2adab711e2ed692c28260115b6fe43a95da7d4f8a03be27d94a1233d5901afdb8fca36ba5aa6a7a305e

        • C:\Windows\SysWOW64\GP_CLT_LNCA_Service.exe

          Filesize

          24KB

          MD5

          117637bf8e49ceac11dd381cb4b0f703

          SHA1

          77e9f575cb4f93d914c9371a53d6dfd2e61ce218

          SHA256

          82ddc3f2363c24cdd5550223a6686a3c0622692a2337a18a15a2d2bf95fc11f5

          SHA512

          f7ba0b208e77ae05158d6a3e5c1d8fd82c62c47a4f61e2adab711e2ed692c28260115b6fe43a95da7d4f8a03be27d94a1233d5901afdb8fca36ba5aa6a7a305e

        • C:\Windows\SysWOW64\VISTA64_DriverInstall.exe

          Filesize

          64KB

          MD5

          3ef08aaf04ece1ca290cc50946b6ac7d

          SHA1

          28bf0fd04e5aa03343b9d1f353aacd49fc08a768

          SHA256

          a3a1b84851a2544f55585da1e1ba8150350fdd3d3f80c5664b73089fcc9f3dfa

          SHA512

          6028d62fd440e450ebcdb1ae185e055773e5f2723254b50867915e1eafc9b41a0fe759651e3b4800c3b2d0153d56a8e795f38cfba739c97c96098f0cde88f753

        • C:\Windows\syswow64\CIDCUSB.inf

          Filesize

          7KB

          MD5

          7486da61128fc1a30aad41d28a18d6bf

          SHA1

          c8e50522236b2ef730d9e33c4956a987858efb81

          SHA256

          09678517654185d91de64ac89639a01ea8f7922c90feb9d356c708bbd8006893

          SHA512

          1a653e6a30496f810c0b7ac911adac54f0bc263a43b3b8d3ce386161c5731dca1f2d2755af3d346c9d683809a7d037950482b1303d9e8e7e69966c955ebb43d0

        • C:\Windows\syswow64\CIDCUSB.sys

          Filesize

          17KB

          MD5

          796a0d08823bc9ca9b03c51137a6a676

          SHA1

          0cd0e117d3055143d3aa5ccf3bdaa036f4ff8409

          SHA256

          bd436c7e3c03c20a88807a610fe7f17e6de3e21924edc2c77834801033d8ccd4

          SHA512

          18173c0e23cadd16b905699abc413d713a4bd6f2c658befb3232a19e66207f6bfcf2f0979ac1577d68c4bf8cbc3c5ee487baeda53bdeefb1e16dc31085c40c3f

        • C:\Windows\syswow64\GP_COS_LNCA.dll

          Filesize

          604KB

          MD5

          8575af4ef74168fc3e8ebbcda94d294c

          SHA1

          ce768c930c9efd19de252130ebdf4696c0403305

          SHA256

          0586d34c0cda53b6123bc6c5847e8863b08ffc38d2bdef54d2f80db51406a70f

          SHA512

          fc7e0f52cb3a23b752e68cb9d0e129e0b15ab1f7483817eea531201b691e69ad8c6a56407dbc438c42df323b64a8b8488a558597dcfe8955781f8b6a40a981e4

        • C:\Windows\syswow64\GP_IFD_LNCA.dll

          Filesize

          156KB

          MD5

          bdc9e891ea0eac91d292080a83d43997

          SHA1

          b42a613d1ac67723fcc1e2f1896c75d350bdd6db

          SHA256

          8a6bd5135f00f0cc4dc07efa37694a26bfbcda2e429d5847325ea891fdc9b1fe

          SHA512

          26aa70cb8182fc6edf884c84f0325a39d3c6879df33ebbd8173728dd3827d6e77ba145fd0165f97154c44eb732f3a73d8f6763bda698dd3dc20811eda0629605

        • C:\Windows\syswow64\cidcusb.cat

          Filesize

          11KB

          MD5

          c068d42c8140b61dce772f61786fd267

          SHA1

          8c3124a60cdbf75eb5aef874fb77905a68cce7e5

          SHA256

          3a6924b7e1268162ba801227c4cc26847e8d44025d135d81f419bc3fc60073d8

          SHA512

          14b36b5ad2900f0757af04a194c95f873c7badd8d3b943ebafc1baa868190ed4a0310c4df092833d2cd60eb247d85994764c5f1cb40730f9bd43caed9931e49d

        • \Windows\SysWOW64\GP_ADM_LNCA.exe

          Filesize

          88KB

          MD5

          156746591e8705b3e6ba0cba17dee0e5

          SHA1

          9144e390354e95df949b1267be15a6cf5d128678

          SHA256

          2a569fd1a4f433526b7dfe568e9ec37f5219739f92666307407475a6eb8b0e96

          SHA512

          8978bb7ff961ae671831d1bab369200e98dbe1327c25231b13867a1a497b4844d589820cd3c07c8b0c376970e0befb10460e1a002f6435ab15aa7e4bb7b8ec52

        • \Windows\SysWOW64\GP_CLT_LNCA.exe

          Filesize

          236KB

          MD5

          1362d662e55d16d526c923eb11faa59e

          SHA1

          51c2932a85d1bcf08319cd58c441539d856280b2

          SHA256

          ff986fb70d1bb3b25351946d1e788d66284163234f46a33c3b80bd290565316f

          SHA512

          f83c351a03fcc76fce1ba069ca1a11d29bd5fca849008796bd3e308e9f7b059eb036dc07f43d7bf0f2d11123d81c8e11b20fdce988036c552978184fcc670642

        • \Windows\SysWOW64\GP_CLT_LNCA.exe

          Filesize

          236KB

          MD5

          1362d662e55d16d526c923eb11faa59e

          SHA1

          51c2932a85d1bcf08319cd58c441539d856280b2

          SHA256

          ff986fb70d1bb3b25351946d1e788d66284163234f46a33c3b80bd290565316f

          SHA512

          f83c351a03fcc76fce1ba069ca1a11d29bd5fca849008796bd3e308e9f7b059eb036dc07f43d7bf0f2d11123d81c8e11b20fdce988036c552978184fcc670642

        • \Windows\SysWOW64\GP_CLT_LNCA.exe

          Filesize

          236KB

          MD5

          1362d662e55d16d526c923eb11faa59e

          SHA1

          51c2932a85d1bcf08319cd58c441539d856280b2

          SHA256

          ff986fb70d1bb3b25351946d1e788d66284163234f46a33c3b80bd290565316f

          SHA512

          f83c351a03fcc76fce1ba069ca1a11d29bd5fca849008796bd3e308e9f7b059eb036dc07f43d7bf0f2d11123d81c8e11b20fdce988036c552978184fcc670642

        • \Windows\SysWOW64\GP_CLT_LNCA.exe

          Filesize

          236KB

          MD5

          1362d662e55d16d526c923eb11faa59e

          SHA1

          51c2932a85d1bcf08319cd58c441539d856280b2

          SHA256

          ff986fb70d1bb3b25351946d1e788d66284163234f46a33c3b80bd290565316f

          SHA512

          f83c351a03fcc76fce1ba069ca1a11d29bd5fca849008796bd3e308e9f7b059eb036dc07f43d7bf0f2d11123d81c8e11b20fdce988036c552978184fcc670642

        • \Windows\SysWOW64\GP_CLT_LNCA.exe

          Filesize

          236KB

          MD5

          1362d662e55d16d526c923eb11faa59e

          SHA1

          51c2932a85d1bcf08319cd58c441539d856280b2

          SHA256

          ff986fb70d1bb3b25351946d1e788d66284163234f46a33c3b80bd290565316f

          SHA512

          f83c351a03fcc76fce1ba069ca1a11d29bd5fca849008796bd3e308e9f7b059eb036dc07f43d7bf0f2d11123d81c8e11b20fdce988036c552978184fcc670642

        • \Windows\SysWOW64\GP_CLT_LNCA_Service.exe

          Filesize

          24KB

          MD5

          117637bf8e49ceac11dd381cb4b0f703

          SHA1

          77e9f575cb4f93d914c9371a53d6dfd2e61ce218

          SHA256

          82ddc3f2363c24cdd5550223a6686a3c0622692a2337a18a15a2d2bf95fc11f5

          SHA512

          f7ba0b208e77ae05158d6a3e5c1d8fd82c62c47a4f61e2adab711e2ed692c28260115b6fe43a95da7d4f8a03be27d94a1233d5901afdb8fca36ba5aa6a7a305e

        • \Windows\SysWOW64\GP_CLT_LNCA_Service.exe

          Filesize

          24KB

          MD5

          117637bf8e49ceac11dd381cb4b0f703

          SHA1

          77e9f575cb4f93d914c9371a53d6dfd2e61ce218

          SHA256

          82ddc3f2363c24cdd5550223a6686a3c0622692a2337a18a15a2d2bf95fc11f5

          SHA512

          f7ba0b208e77ae05158d6a3e5c1d8fd82c62c47a4f61e2adab711e2ed692c28260115b6fe43a95da7d4f8a03be27d94a1233d5901afdb8fca36ba5aa6a7a305e

        • \Windows\SysWOW64\GP_CLT_LNCA_Service.exe

          Filesize

          24KB

          MD5

          117637bf8e49ceac11dd381cb4b0f703

          SHA1

          77e9f575cb4f93d914c9371a53d6dfd2e61ce218

          SHA256

          82ddc3f2363c24cdd5550223a6686a3c0622692a2337a18a15a2d2bf95fc11f5

          SHA512

          f7ba0b208e77ae05158d6a3e5c1d8fd82c62c47a4f61e2adab711e2ed692c28260115b6fe43a95da7d4f8a03be27d94a1233d5901afdb8fca36ba5aa6a7a305e

        • \Windows\SysWOW64\GP_CLT_LNCA_Service.exe

          Filesize

          24KB

          MD5

          117637bf8e49ceac11dd381cb4b0f703

          SHA1

          77e9f575cb4f93d914c9371a53d6dfd2e61ce218

          SHA256

          82ddc3f2363c24cdd5550223a6686a3c0622692a2337a18a15a2d2bf95fc11f5

          SHA512

          f7ba0b208e77ae05158d6a3e5c1d8fd82c62c47a4f61e2adab711e2ed692c28260115b6fe43a95da7d4f8a03be27d94a1233d5901afdb8fca36ba5aa6a7a305e

        • \Windows\SysWOW64\GP_CLT_LNCA_Service.exe

          Filesize

          24KB

          MD5

          117637bf8e49ceac11dd381cb4b0f703

          SHA1

          77e9f575cb4f93d914c9371a53d6dfd2e61ce218

          SHA256

          82ddc3f2363c24cdd5550223a6686a3c0622692a2337a18a15a2d2bf95fc11f5

          SHA512

          f7ba0b208e77ae05158d6a3e5c1d8fd82c62c47a4f61e2adab711e2ed692c28260115b6fe43a95da7d4f8a03be27d94a1233d5901afdb8fca36ba5aa6a7a305e

        • \Windows\SysWOW64\GP_COS_LNCA.dll

          Filesize

          604KB

          MD5

          8575af4ef74168fc3e8ebbcda94d294c

          SHA1

          ce768c930c9efd19de252130ebdf4696c0403305

          SHA256

          0586d34c0cda53b6123bc6c5847e8863b08ffc38d2bdef54d2f80db51406a70f

          SHA512

          fc7e0f52cb3a23b752e68cb9d0e129e0b15ab1f7483817eea531201b691e69ad8c6a56407dbc438c42df323b64a8b8488a558597dcfe8955781f8b6a40a981e4

        • \Windows\SysWOW64\GP_IFD_LNCA.dll

          Filesize

          156KB

          MD5

          bdc9e891ea0eac91d292080a83d43997

          SHA1

          b42a613d1ac67723fcc1e2f1896c75d350bdd6db

          SHA256

          8a6bd5135f00f0cc4dc07efa37694a26bfbcda2e429d5847325ea891fdc9b1fe

          SHA512

          26aa70cb8182fc6edf884c84f0325a39d3c6879df33ebbd8173728dd3827d6e77ba145fd0165f97154c44eb732f3a73d8f6763bda698dd3dc20811eda0629605

        • \Windows\SysWOW64\GP_UNI_LNCA.exe

          Filesize

          76KB

          MD5

          f9fde36a6b52ebf0bcfe616e26ea4927

          SHA1

          6b039d4708cde4f68bbbcf015a3db7b035dd6c76

          SHA256

          e0cbb06e5ff3f930b3280b10ab68872b15ddf45086d623c9300a5f605caaf5a0

          SHA512

          27873a7c2cb7b5ca6add7c8e027ea86ac32c92f16d1de5e24bdba312b86e0108b70ca46f5670669a292e2ee7a1e2a0a139cbd9c791acb071b297ffed70eade12

        • \Windows\SysWOW64\VISTA64_DriverInstall.exe

          Filesize

          64KB

          MD5

          3ef08aaf04ece1ca290cc50946b6ac7d

          SHA1

          28bf0fd04e5aa03343b9d1f353aacd49fc08a768

          SHA256

          a3a1b84851a2544f55585da1e1ba8150350fdd3d3f80c5664b73089fcc9f3dfa

          SHA512

          6028d62fd440e450ebcdb1ae185e055773e5f2723254b50867915e1eafc9b41a0fe759651e3b4800c3b2d0153d56a8e795f38cfba739c97c96098f0cde88f753

        • memory/1444-90-0x0000000002E40000-0x0000000002ED9000-memory.dmp

          Filesize

          612KB

        • memory/1444-89-0x0000000002E41000-0x0000000002EA6000-memory.dmp

          Filesize

          404KB

        • memory/1660-57-0x0000000000400000-0x000000000066E000-memory.dmp

          Filesize

          2.4MB

        • memory/1660-55-0x0000000000400000-0x000000000066E000-memory.dmp

          Filesize

          2.4MB

        • memory/1660-56-0x0000000000400000-0x000000000066E000-memory.dmp

          Filesize

          2.4MB

        • memory/1660-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

          Filesize

          8KB

        • memory/1660-91-0x0000000000400000-0x000000000066E000-memory.dmp

          Filesize

          2.4MB