Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2022, 20:17

General

  • Target

    71f8af6c3a6df000fe223e15cb71c0bf8df6662d8317c38472c5ed07a3fa5c85.exe

  • Size

    1.7MB

  • MD5

    0aa0a08d376c9647fc946a6ca5081200

  • SHA1

    139214283676ca74e9d9f0ddd24bee36a951ecc5

  • SHA256

    71f8af6c3a6df000fe223e15cb71c0bf8df6662d8317c38472c5ed07a3fa5c85

  • SHA512

    4f82f0512e3e1d9ddc932de278ca19b9b8947537051527fa4325759188d767a1ec34ee498f9e828eff2010f892ddae1f240808ef2b63bd94ae388adbd79839f3

  • SSDEEP

    24576:OXdVtTj2i64T+jdxQCfgOFD3WSwd2QtBBw6xxhVxQtmibjOhZaiRu/4oMaop0UNA:mbTChxKCnFnQXBbrtgb/iQvu0UHOp

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71f8af6c3a6df000fe223e15cb71c0bf8df6662d8317c38472c5ed07a3fa5c85.exe
    "C:\Users\Admin\AppData\Local\Temp\71f8af6c3a6df000fe223e15cb71c0bf8df6662d8317c38472c5ed07a3fa5c85.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1784
          • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 1756
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1372
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat" "
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:600
              • C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                "C:\Users\Admin\AppData\Local\Temp\wtmps.exe"
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:1944
                • C:\Windows\SysWOW64\mscaps.exe
                  "C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                  8⤵
                  • Executes dropped EXE
                  PID:1964
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
      2⤵
      • Deletes itself
      PID:1376

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\wtmps.exe

    Filesize

    276KB

    MD5

    75c1467042b38332d1ea0298f29fb592

    SHA1

    f92ea770c2ddb04cf0d20914578e4c482328f0f8

    SHA256

    3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

    SHA512

    5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

  • C:\Users\Admin\AppData\Local\Temp\wtmps.exe

    Filesize

    276KB

    MD5

    75c1467042b38332d1ea0298f29fb592

    SHA1

    f92ea770c2ddb04cf0d20914578e4c482328f0f8

    SHA256

    3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

    SHA512

    5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

    Filesize

    172KB

    MD5

    daac1781c9d22f5743ade0cb41feaebf

    SHA1

    e2549eeeea42a6892b89d354498fcaa8ffd9cac4

    SHA256

    6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

    SHA512

    190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

  • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

    Filesize

    172KB

    MD5

    daac1781c9d22f5743ade0cb41feaebf

    SHA1

    e2549eeeea42a6892b89d354498fcaa8ffd9cac4

    SHA256

    6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

    SHA512

    190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

  • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

    Filesize

    1.7MB

    MD5

    5f3e167a973b6df7e5c7f68a8d82efce

    SHA1

    fe825219b7cebc57d57cf5de79592e6080b9bcc2

    SHA256

    0f5d70a4d489e1c1ceddcaba98e5fcb85584dc41ac01d083d701e1547fab343c

    SHA512

    a9107fbf82ae88b60aa389401a4ff39a0651ac7432024461e8bec5b920a8a2904a949eccfd2ac4b6fce06f9cc1044c069759b4daf3728686eadbeb0fb5d38ce4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

    Filesize

    1.7MB

    MD5

    5f3e167a973b6df7e5c7f68a8d82efce

    SHA1

    fe825219b7cebc57d57cf5de79592e6080b9bcc2

    SHA256

    0f5d70a4d489e1c1ceddcaba98e5fcb85584dc41ac01d083d701e1547fab343c

    SHA512

    a9107fbf82ae88b60aa389401a4ff39a0651ac7432024461e8bec5b920a8a2904a949eccfd2ac4b6fce06f9cc1044c069759b4daf3728686eadbeb0fb5d38ce4

  • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

    Filesize

    129B

    MD5

    d1073c9b34d1bbd570928734aacff6a5

    SHA1

    78714e24e88d50e0da8da9d303bec65b2ee6d903

    SHA256

    b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

    SHA512

    4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

  • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

    Filesize

    302B

    MD5

    053b39ddb836938e0c7077b1eb33bfab

    SHA1

    f4749a9a9a27abb59ec40d52c49fc5351d750a06

    SHA256

    4a1e6ce0047dbb1443cf3cd58c9fcd0170f6ab2b4096cb0aebc8d69e62d1b7ab

    SHA512

    cd0aa9d04d730da2960cd7efb608347c4872873b9f62cd7bf4bf3a3494cad9df0aa4cb9441615f4a38ef11f350f325e4514f02dec4af347d7d63dce8094b8ff4

  • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

    Filesize

    126B

    MD5

    262aaaf6cd7f151e1a8c8940e6b29cc3

    SHA1

    043c956e5c2fbdb79ff4852e173149eccd97d5ba

    SHA256

    8b7ee785c2e9bccbea220e84187de001fa2746e43d9e4223a68455fec0f38962

    SHA512

    ff3b1e0d51b785716a554915efdfaa629c6bb9e75a9719f5cef5ac63a23ffdc26cfc08cf9b6bd1afd999bacedcddc4d561fd6ef479ae8d9698193851035a92de

  • C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat

    Filesize

    102B

    MD5

    3ca08f080a7a28416774d80552d4aa08

    SHA1

    0b5f0ba641204b27adac4140fd45dce4390dbf24

    SHA256

    4e7d460b8dc9f2c01b4c5a16fb956aced10127bc940e8039a80c6455901ea1f0

    SHA512

    0c64aa462ff70473ef763ec392296fe0ea59b5340c26978531a416732bc3845adf9ca7b673cb7b4ba40cc45674351206096995c43600fccbbbe64e51b6019f01

  • C:\Windows\SysWOW64\mscaps.exe

    Filesize

    200KB

    MD5

    78d3c8705f8baf7d34e6a6737d1cfa18

    SHA1

    9f09e248a29311dbeefae9d85937b13da042a010

    SHA256

    2c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905

    SHA512

    9a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609

  • \Users\Admin\AppData\Local\Temp\wtmps.exe

    Filesize

    276KB

    MD5

    75c1467042b38332d1ea0298f29fb592

    SHA1

    f92ea770c2ddb04cf0d20914578e4c482328f0f8

    SHA256

    3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

    SHA512

    5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

  • \Users\Admin\AppData\Local\Temp\wtmps.exe

    Filesize

    276KB

    MD5

    75c1467042b38332d1ea0298f29fb592

    SHA1

    f92ea770c2ddb04cf0d20914578e4c482328f0f8

    SHA256

    3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

    SHA512

    5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

  • \Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

    Filesize

    172KB

    MD5

    daac1781c9d22f5743ade0cb41feaebf

    SHA1

    e2549eeeea42a6892b89d354498fcaa8ffd9cac4

    SHA256

    6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

    SHA512

    190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

  • \Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

    Filesize

    172KB

    MD5

    daac1781c9d22f5743ade0cb41feaebf

    SHA1

    e2549eeeea42a6892b89d354498fcaa8ffd9cac4

    SHA256

    6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

    SHA512

    190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

  • \Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

    Filesize

    1.7MB

    MD5

    5f3e167a973b6df7e5c7f68a8d82efce

    SHA1

    fe825219b7cebc57d57cf5de79592e6080b9bcc2

    SHA256

    0f5d70a4d489e1c1ceddcaba98e5fcb85584dc41ac01d083d701e1547fab343c

    SHA512

    a9107fbf82ae88b60aa389401a4ff39a0651ac7432024461e8bec5b920a8a2904a949eccfd2ac4b6fce06f9cc1044c069759b4daf3728686eadbeb0fb5d38ce4

  • \Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

    Filesize

    1.7MB

    MD5

    5f3e167a973b6df7e5c7f68a8d82efce

    SHA1

    fe825219b7cebc57d57cf5de79592e6080b9bcc2

    SHA256

    0f5d70a4d489e1c1ceddcaba98e5fcb85584dc41ac01d083d701e1547fab343c

    SHA512

    a9107fbf82ae88b60aa389401a4ff39a0651ac7432024461e8bec5b920a8a2904a949eccfd2ac4b6fce06f9cc1044c069759b4daf3728686eadbeb0fb5d38ce4

  • \Users\Admin\AppData\Roaming\Temp\mydll.dll

    Filesize

    202KB

    MD5

    7ff15a4f092cd4a96055ba69f903e3e9

    SHA1

    a3d338a38c2b92f95129814973f59446668402a8

    SHA256

    1b594e6d057c632abb3a8cf838157369024bd6b9f515ca8e774b22fe71a11627

    SHA512

    4b015d011c14c7e10568c09bf81894681535efb7d76c3ef9071fffb3837f62b36e695187b2d32581a30f07e79971054e231a2ca4e8ad7f0f83d5876f8c086dae

  • \Users\Admin\AppData\Roaming\Temp\mydll.dll

    Filesize

    202KB

    MD5

    7ff15a4f092cd4a96055ba69f903e3e9

    SHA1

    a3d338a38c2b92f95129814973f59446668402a8

    SHA256

    1b594e6d057c632abb3a8cf838157369024bd6b9f515ca8e774b22fe71a11627

    SHA512

    4b015d011c14c7e10568c09bf81894681535efb7d76c3ef9071fffb3837f62b36e695187b2d32581a30f07e79971054e231a2ca4e8ad7f0f83d5876f8c086dae

  • memory/1372-81-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB

  • memory/1720-55-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB

  • memory/1720-54-0x00000000765B1000-0x00000000765B3000-memory.dmp

    Filesize

    8KB