Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 13:32

General

  • Target

    5040f8ecb29928c42b4c2987a2720ae531e03e5befd2fe798f0779fa99286620.exe

  • Size

    139KB

  • MD5

    6ec08512d5f95271c8a8317654c9c700

  • SHA1

    8e0836c1d793863d76ea4e463c50ea70c6d1bff0

  • SHA256

    5040f8ecb29928c42b4c2987a2720ae531e03e5befd2fe798f0779fa99286620

  • SHA512

    ab4777cab7c7671ddbb63766a2b4f9524eebe1fcedb7db1eadd9e7936f613fad2f9bb77f931ed60306c3dcffbac47a793127ff93766d1077d14f686bd5d46e08

  • SSDEEP

    3072:4gXdZt9P6D3XJcMufNC0Rc1SOCsC3FFkX1Sl9vwlH6EePM2d+a:4e34fENCEVFklSl9oVs+a

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5040f8ecb29928c42b4c2987a2720ae531e03e5befd2fe798f0779fa99286620.exe
    "C:\Users\Admin\AppData\Local\Temp\5040f8ecb29928c42b4c2987a2720ae531e03e5befd2fe798f0779fa99286620.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4204
    • C:\Users\Admin\AppData\Local\Temp\LTransmogProvider.exe
      C:\Users\Admin\AppData\Local\Temp\LTransmogProvider.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Users\Admin\AppData\Local\Temp\LTransmogProvider.exe
        C:\Users\Admin\AppData\Local\Temp\LTransmogProvider.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:5024

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\LTransmogProvider.exe

    Filesize

    76KB

    MD5

    7c2b1af9b725c26a53c16f68db686b34

    SHA1

    9b7cdca383f9cdb524a36fbb8ed67454c2232bea

    SHA256

    c518973042a48ea9a3c29690407d0e89d5c5da199e0d7647f087f15989126a8b

    SHA512

    afe87e2f984f8e94ff9297fb180d624e4d5279d923427566fe3c465d5f9f839d602163b1a36e0b6af0edeca400c547d9076da49d132740f52b15c70502d81138

  • C:\Users\Admin\AppData\Local\Temp\LTransmogProvider.exe

    Filesize

    76KB

    MD5

    7c2b1af9b725c26a53c16f68db686b34

    SHA1

    9b7cdca383f9cdb524a36fbb8ed67454c2232bea

    SHA256

    c518973042a48ea9a3c29690407d0e89d5c5da199e0d7647f087f15989126a8b

    SHA512

    afe87e2f984f8e94ff9297fb180d624e4d5279d923427566fe3c465d5f9f839d602163b1a36e0b6af0edeca400c547d9076da49d132740f52b15c70502d81138

  • C:\Users\Admin\AppData\Local\Temp\LTransmogProvider.exe

    Filesize

    76KB

    MD5

    7c2b1af9b725c26a53c16f68db686b34

    SHA1

    9b7cdca383f9cdb524a36fbb8ed67454c2232bea

    SHA256

    c518973042a48ea9a3c29690407d0e89d5c5da199e0d7647f087f15989126a8b

    SHA512

    afe87e2f984f8e94ff9297fb180d624e4d5279d923427566fe3c465d5f9f839d602163b1a36e0b6af0edeca400c547d9076da49d132740f52b15c70502d81138

  • C:\Users\Admin\AppData\Local\Temp\setup.dat

    Filesize

    83KB

    MD5

    98c52c6a9ed7a21e856a1436bcc81b12

    SHA1

    b2d5b87dde9e396063ca6074eccef01bd088dd0f

    SHA256

    9dc59a3a6411646c1708c375a19ed2b57823fb5f033df44cb6959fea6dc8268e

    SHA512

    3acd7ede5203607e6bd9430b86b6ab27e2e81f487ac0b4db61acf4c0cbd8b93d5ad9c0e59cebf30753d174bbc43e5732557e062c51738bba23dad2b1f30ef77d

  • memory/5024-138-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/5024-141-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/5024-143-0x0000000010000000-0x000000001000F000-memory.dmp

    Filesize

    60KB

  • memory/5024-147-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB