Analysis

  • max time kernel
    41s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-09-2022 03:01

General

  • Target

    test1.exe

  • Size

    115KB

  • MD5

    664bbe2d9202f9818266a3d2a580c56e

  • SHA1

    35aa8d2f9ba4f06822b673d9d1b6513e2ba4a9bf

  • SHA256

    21f5a7f1afed0463cbff4606e7e0b3886d606fe1c9006c78d3e631eace98c22a

  • SHA512

    adeb1bee01330e0913abf25a22b095651076fee7906816503b0e26ac38d775593aa1d496ca9eed7736962748febfde50b73e254c63bc0c4df0f9f7339cf1d37b

  • SSDEEP

    3072:Fpvb7RV/8hhb3dLUK94IgqHniOSyaZoc7QNPnP9TBfWSX9:n9VkhhrdYK94IgqHniOSyaZoc7QNPnPV

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\test1.exe
    "C:\Users\Admin\AppData\Local\Temp\test1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" –NoProfile -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\Temp\FAC4.tmp\FAC5.tmp\FAC6.ps1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:684
      • C:\Windows\system32\reg.exe
        "C:\Windows\system32\reg.exe" add HKEY_CLASSES_ROOT\Microsoft.PowerShellScript.1\Shell\Open\Command /t REG_SZ /d "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe %1" /f
        3⤵
        • Modifies registry class
        PID:1128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FAC4.tmp\FAC5.tmp\FAC6.ps1

    Filesize

    318B

    MD5

    7969fcdd4e5fc2955092d943786cfd29

    SHA1

    d4dc4aeca61a30695ced77baff8725b7cd864ccf

    SHA256

    915bafb42e87e067af8ec98edf0063b7645456fcebda5b6db52924b322b0a29c

    SHA512

    54456bb419429a792477cdd0acbc1ad670af619545f7e7101540ab9ed8b66dc57a54b97a60ca44f7bdb67ffab8594069195669943a425e55cdf221ce7d756def

  • memory/684-55-0x0000000000000000-mapping.dmp

  • memory/684-57-0x000007FEF37D0000-0x000007FEF41F3000-memory.dmp

    Filesize

    10.1MB

  • memory/684-58-0x000007FEF2C70000-0x000007FEF37CD000-memory.dmp

    Filesize

    11.4MB

  • memory/684-59-0x00000000028A4000-0x00000000028A7000-memory.dmp

    Filesize

    12KB

  • memory/684-62-0x00000000028A4000-0x00000000028A7000-memory.dmp

    Filesize

    12KB

  • memory/684-63-0x00000000028AB000-0x00000000028CA000-memory.dmp

    Filesize

    124KB

  • memory/1044-54-0x000007FEFB821000-0x000007FEFB823000-memory.dmp

    Filesize

    8KB

  • memory/1128-61-0x0000000000000000-mapping.dmp