Analysis

  • max time kernel
    46s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2022, 10:54

General

  • Target

    eng-3.vtt

  • Size

    25KB

  • MD5

    aca8ac032298287914d29a537d15db77

  • SHA1

    9a464492ee54efbe8cd5a616ad2b5f11ff7a60ca

  • SHA256

    2b1af35dcf3b44496101c6170f7b96ca32034f3b3712f8f0b2e4535fdb7062b1

  • SHA512

    576f019d7bb4e4b082e68fd6ac158e2519e5b25d4923f789e346f3159f848df99e6744b90001d7ac2614e45525f27e019c71cd5311c63e8f88026e3fd093ff81

  • SSDEEP

    768:hIbbbuY7KexwIYJ5d/upgCtqqVnlUF5X1pX6JHs4etf:8vPWStqp24

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 11 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\eng-3.vtt
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\eng-3.vtt
      2⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\eng-3.vtt"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1772
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -url C:\Users\Admin\AppData\Local\Temp\eng-3.vtt
          4⤵
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1608
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1608.0.1687139101\756810168" -parentBuildID 20200403170909 -prefsHandle 1196 -prefMapHandle 1188 -prefsLen 1 -prefMapSize 220106 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1608 "\\.\pipe\gecko-crash-server-pipe.1608" 1240 gpu
            5⤵
              PID:1388
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1608.3.1257586750\318282428" -childID 1 -isForBrowser -prefsHandle 1664 -prefMapHandle 1100 -prefsLen 156 -prefMapSize 220106 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1608 "\\.\pipe\gecko-crash-server-pipe.1608" 1104 tab
              5⤵
                PID:1596
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1608.13.939873713\2032759176" -childID 2 -isForBrowser -prefsHandle 2680 -prefMapHandle 2676 -prefsLen 6938 -prefMapSize 220106 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1608 "\\.\pipe\gecko-crash-server-pipe.1608" 2692 tab
                5⤵
                  PID:1724
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1608.20.109736161\1590818418" -childID 3 -isForBrowser -prefsHandle 3232 -prefMapHandle 3236 -prefsLen 7643 -prefMapSize 220106 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1608 "\\.\pipe\gecko-crash-server-pipe.1608" 3204 tab
                  5⤵
                    PID:2148

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1764-54-0x000007FEFBF21000-0x000007FEFBF23000-memory.dmp

            Filesize

            8KB