Analysis
-
max time kernel
153s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 23:20
Static task
static1
Behavioral task
behavioral1
Sample
61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe
Resource
win10v2004-20220901-en
General
-
Target
61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe
-
Size
93KB
-
MD5
67cec721adc056510bf16507032e3fd0
-
SHA1
9d1c6b781fe0f0d6ed145910ed958a50f0e9a86d
-
SHA256
61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558
-
SHA512
11a74b7ddc62b406f0e4ebc417509cf9d3bf28610d380e3634f1d933137d80e6572bdcc4cb7151976f9a5d41e37e90cb172c7907fbb45020656db0d75b72fa58
-
SSDEEP
1536:7SV8/DcCDCMMkG0DaXJNMEgTSBY3Pzl9PLP2TJoH+9QYQLVhvOkSXCnt:7S8BCfoDaXJNMi2XPL2Ce9QYQR5OkSXC
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1940 NvdUpd.exe 612 NvdUpd.exe -
Loads dropped DLL 3 IoCs
pid Process 1664 61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe 1664 61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe 1664 61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run 61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvUpdSrv = "C:\\Users\\Admin\\AppData\\Local\\NVIDIA Corporation\\Updates\\NvdUpd.exe" 61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1940 set thread context of 612 1940 NvdUpd.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1940 1664 61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe 28 PID 1664 wrote to memory of 1940 1664 61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe 28 PID 1664 wrote to memory of 1940 1664 61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe 28 PID 1664 wrote to memory of 1940 1664 61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe 28 PID 1940 wrote to memory of 612 1940 NvdUpd.exe 29 PID 1940 wrote to memory of 612 1940 NvdUpd.exe 29 PID 1940 wrote to memory of 612 1940 NvdUpd.exe 29 PID 1940 wrote to memory of 612 1940 NvdUpd.exe 29 PID 1940 wrote to memory of 612 1940 NvdUpd.exe 29 PID 1940 wrote to memory of 612 1940 NvdUpd.exe 29 PID 1940 wrote to memory of 612 1940 NvdUpd.exe 29 PID 1940 wrote to memory of 612 1940 NvdUpd.exe 29 PID 1940 wrote to memory of 612 1940 NvdUpd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe"C:\Users\Admin\AppData\Local\Temp\61bb3c864b567fc1bee5948d9a6422a4a923415a23aa47ba8624588de83e3558.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe"C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe"C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe"3⤵
- Executes dropped EXE
PID:612
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD568230fd9724f15fd008cf6e8f6b6f19a
SHA1489344586ec442da0824f0ed7e9194474778475b
SHA25609ffc88a0d06cd0da5cd96e17a6ddb9de59c5b27e36c81c815149f5a34350e76
SHA5128cafeb09372a357c00eeb9e5799d4301b251178a7e844ec56facc709a0f182ee3469d63653778fe7f10aea0c157298aa02d930ff0e02e3d082ad93c0fc6ce4e6
-
Filesize
108KB
MD568230fd9724f15fd008cf6e8f6b6f19a
SHA1489344586ec442da0824f0ed7e9194474778475b
SHA25609ffc88a0d06cd0da5cd96e17a6ddb9de59c5b27e36c81c815149f5a34350e76
SHA5128cafeb09372a357c00eeb9e5799d4301b251178a7e844ec56facc709a0f182ee3469d63653778fe7f10aea0c157298aa02d930ff0e02e3d082ad93c0fc6ce4e6
-
Filesize
108KB
MD568230fd9724f15fd008cf6e8f6b6f19a
SHA1489344586ec442da0824f0ed7e9194474778475b
SHA25609ffc88a0d06cd0da5cd96e17a6ddb9de59c5b27e36c81c815149f5a34350e76
SHA5128cafeb09372a357c00eeb9e5799d4301b251178a7e844ec56facc709a0f182ee3469d63653778fe7f10aea0c157298aa02d930ff0e02e3d082ad93c0fc6ce4e6
-
Filesize
108KB
MD568230fd9724f15fd008cf6e8f6b6f19a
SHA1489344586ec442da0824f0ed7e9194474778475b
SHA25609ffc88a0d06cd0da5cd96e17a6ddb9de59c5b27e36c81c815149f5a34350e76
SHA5128cafeb09372a357c00eeb9e5799d4301b251178a7e844ec56facc709a0f182ee3469d63653778fe7f10aea0c157298aa02d930ff0e02e3d082ad93c0fc6ce4e6
-
Filesize
108KB
MD568230fd9724f15fd008cf6e8f6b6f19a
SHA1489344586ec442da0824f0ed7e9194474778475b
SHA25609ffc88a0d06cd0da5cd96e17a6ddb9de59c5b27e36c81c815149f5a34350e76
SHA5128cafeb09372a357c00eeb9e5799d4301b251178a7e844ec56facc709a0f182ee3469d63653778fe7f10aea0c157298aa02d930ff0e02e3d082ad93c0fc6ce4e6
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f