Analysis

  • max time kernel
    71s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 05:44

General

  • Target

    e873a3a14271572ef5baf50e831b2973dc946b7168f395e3e48b54c3e7e70065.exe

  • Size

    21KB

  • MD5

    05326bd441313c30b467c51d7447caf4

  • SHA1

    27498a4efc268ec03c362f0e8bb4fa308c8c12d6

  • SHA256

    e873a3a14271572ef5baf50e831b2973dc946b7168f395e3e48b54c3e7e70065

  • SHA512

    de8ff64281152b5012b6424a0a96ac6eaa1c7ca7fea6a49f1eaa326ed3c682322be3e1a30ee9fe10ae5ccbdc4cfb9cbc4cf6a65a51da584ad89388d1609564f3

  • SSDEEP

    384:Wpr9sOcIp6wRcsSYLvKWLWbstQTid6HJyraXkqdkJ7PNWoVNaNJawcudoD7U5Ov:2mOhplcsHvKWzX6HJmFqda7kounbcuy1

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 12 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e873a3a14271572ef5baf50e831b2973dc946b7168f395e3e48b54c3e7e70065.exe
    "C:\Users\Admin\AppData\Local\Temp\e873a3a14271572ef5baf50e831b2973dc946b7168f395e3e48b54c3e7e70065.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\EBD6.tmp\system.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\Windows\SysWOW64\attrib.exe
        attrib C:\Windows\wincs +h +s +r
        3⤵
        • Sets file to hidden
        • Drops file in Windows directory
        • Views/modifies file attributes
        PID:1492
      • C:\Windows\SysWOW64\attrib.exe
        attrib C:\pass +h +s +r
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:1752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\EBD6.tmp\system.bat

    Filesize

    1KB

    MD5

    dcfda0bc015ba87324e5f3360090c610

    SHA1

    90b59e326a1c62b26f57006de8b3f7568d84425d

    SHA256

    56c6ff1030d3364e0481f759b396ef6df203c370e108bbf9b0fb60d2e93e5e4d

    SHA512

    c7bd92be055be4f70a9cd62d49eb250229b30f7c0911918cef63993857a3d9e249a74b78ecd2c722442a6c30638dafc019e8bbd1b99b67ceb1d20c83f416e900

  • memory/1280-54-0x0000000075811000-0x0000000075813000-memory.dmp

    Filesize

    8KB

  • memory/1280-59-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1280-60-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB