Analysis

  • max time kernel
    143s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2022, 05:38

General

  • Target

    AutoCAD2022-2021Patch.exe

  • Size

    63KB

  • MD5

    f527ca6b33344e908085bc0a1a315534

  • SHA1

    1bdf4d8b5adcc051cdd886113fdf94dba056e710

  • SHA256

    c14400afeb4673721e231587a33e4afadf0086638e0b51fbdd701d0a2ca362b9

  • SHA512

    646328a00c4f6f2674ae9a6576bd1aa5f1b6d2a6f2662bdd85c96f59b76af8921cafb40981cf4c7dd30983689c9d7c6c34fbe9b03bfced43a764026acbed18be

  • SSDEEP

    1536:yWglxISaepNIJ/i+rpW+PcSxjXz1dHWWAD8LnDh:yBIDKh+VNxNXz1dYD

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AutoCAD2022-2021Patch.exe
    "C:\Users\Admin\AppData\Local\Temp\AutoCAD2022-2021Patch.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1536
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
    1⤵
      PID:568
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
      1⤵
        PID:320
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
        1⤵
          PID:1680

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\dup2patcher.dll

          Filesize

          57KB

          MD5

          18dd871c9f54c77d48f1fca7827db95c

          SHA1

          b4ecc418475ca3ee3832c59f9db8a4b7f8ca153b

          SHA256

          ecae891aded31c21d415aaa774383bc149d9b100cfcc83608302b7fa1235542e

          SHA512

          d248df5235df0dc0786ad0f0f832a00738adf93d7f5f15e83b06fb702f64fe7aaca9ae61936861d1cb9db4596b73239ef3609eb44ebab780d4975ce341984171

        • memory/320-61-0x0000000071BA0000-0x0000000071C91000-memory.dmp

          Filesize

          964KB

        • memory/320-62-0x0000000000260000-0x000000000026A000-memory.dmp

          Filesize

          40KB

        • memory/1536-55-0x0000000075681000-0x0000000075683000-memory.dmp

          Filesize

          8KB

        • memory/1536-56-0x0000000074DF0000-0x0000000074E17000-memory.dmp

          Filesize

          156KB

        • memory/1536-57-0x0000000074731000-0x0000000074733000-memory.dmp

          Filesize

          8KB

        • memory/1536-60-0x0000000071900000-0x0000000072C56000-memory.dmp

          Filesize

          19.3MB

        • memory/1536-63-0x0000000005870000-0x00000000064BA000-memory.dmp

          Filesize

          12.3MB

        • memory/1536-67-0x0000000071900000-0x0000000072C56000-memory.dmp

          Filesize

          19.3MB

        • memory/1536-68-0x0000000074DF0000-0x0000000074E17000-memory.dmp

          Filesize

          156KB

        • memory/1680-65-0x0000000071BA0000-0x0000000071C91000-memory.dmp

          Filesize

          964KB

        • memory/1680-66-0x00000000001D0000-0x00000000001DA000-memory.dmp

          Filesize

          40KB