Analysis

  • max time kernel
    33s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 11:56

General

  • Target

    800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77.exe

  • Size

    91KB

  • MD5

    64e94ad967249c61bf27a31bed8eff31

  • SHA1

    ae6f9edc48403cc645d1d57ba7c8c7c70f70f5be

  • SHA256

    800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77

  • SHA512

    49ac582c10ab1f52530b1a6778366a164479d634e903aad34fd549fe9d1dcf40976b3f395ce75809cce203f6bd5b41a4b742e05742f875996a9e7ed220b597d8

  • SSDEEP

    1536:LlqmbxDIFoprhcZdmF8JC3IDS2E3YHfDqqr/XaNNSykFI+L:Llt9DL9MdmYQIeIHOqr/nykFIq

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77.exe
    "C:\Users\Admin\AppData\Local\Temp\800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Orz..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:1748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Orz..bat

    Filesize

    274B

    MD5

    3fab7b08cb362725af37c2cfaf03aff6

    SHA1

    3154f4d4319a5e7e997876ff1bc76638900cb7ec

    SHA256

    654d374b16209a8efae91a8179c1094f654fb6673ee4117a533229eee6393218

    SHA512

    2b8e5a8f7d660c97c2f1d21774ce5f94fba3f609e1461568ed0252de71e03d0a368caa40c87d0fff7c4634e847b4fb906101daf630d2d66c812d44e179583ff5

  • memory/1668-54-0x0000000075241000-0x0000000075243000-memory.dmp

    Filesize

    8KB

  • memory/1668-55-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1668-56-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1668-58-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB