Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 12:04

General

  • Target

    386d51b4255c2279a9397fb1f3e9726244da2e6a960edde2c6474c2a3af77e68.exe

  • Size

    53KB

  • MD5

    62d38dded4f0a5fc103f0a771404b114

  • SHA1

    d597d9cc6c18a7f32e31384236db4b42f3e939d3

  • SHA256

    386d51b4255c2279a9397fb1f3e9726244da2e6a960edde2c6474c2a3af77e68

  • SHA512

    d11cf1370ad9cefa714a486d4acde85ba6278de1a795fd15d43670ac0180e713d287b2c9e0de91fac5eff4023788727e783d8d7f563037377459b95cbd815cd4

  • SSDEEP

    768:uJChTypVTFylNCQKowZS4E6SynTruH712N3b4wFBOV1mJt6oRZPJW2q5Q/2wRw:uAhTyTTFQNC13U4rtnDb4tmJ8AJq4e

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\386d51b4255c2279a9397fb1f3e9726244da2e6a960edde2c6474c2a3af77e68.exe
    "C:\Users\Admin\AppData\Local\Temp\386d51b4255c2279a9397fb1f3e9726244da2e6a960edde2c6474c2a3af77e68.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\newsetup.vbs"
      2⤵
        PID:1712
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\1.vbs"
        2⤵
          PID:940

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\newsetup.vbs

        Filesize

        651B

        MD5

        4736e7158c27f244482f5a614b9dbdae

        SHA1

        d3a0e95a81e9e3ec95cfd596b25749a0e24e27b9

        SHA256

        b8229bc8d6b0013858fb9599cb510afa4566a439164b2c7444c449540a124acc

        SHA512

        cebf895dd3ec3822c42b78bac49c685b063cb5afcbcfb3850b073cb118d086c5fa75ec50b6e73d90e14f2c6b595752ad87910b8cf27378424d72a9ea309bf824

      • memory/940-57-0x0000000000000000-mapping.dmp

      • memory/1712-55-0x0000000000000000-mapping.dmp

      • memory/1932-54-0x0000000075981000-0x0000000075983000-memory.dmp

        Filesize

        8KB