Analysis

  • max time kernel
    72s
  • max time network
    70s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 19:07

General

  • Target

    450a5777951ba46f37e5587e372e43c847e76b00c370077c367d30af10ef41dc.exe

  • Size

    130KB

  • MD5

    20b6cef19462a6232744e77d1edccf26

  • SHA1

    c6a6e02ebee52899d3b33d7362a1ed5ded072c27

  • SHA256

    450a5777951ba46f37e5587e372e43c847e76b00c370077c367d30af10ef41dc

  • SHA512

    158135eeb8176f48285bcfe1d0f142b8e159cbb565eb594d6ae3a7a5d6fcbeea0bf4f67b77da530db29fe1650f755b243e0d56b348346714d4f3e789f1d3ee5e

  • SSDEEP

    3072:NtI74o0bB/W/e9PR4GC7+ZSsrZUcHQgsm2fGCH:3I749bBea6GS+brZUoAG

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\450a5777951ba46f37e5587e372e43c847e76b00c370077c367d30af10ef41dc.exe
    "C:\Users\Admin\AppData\Local\Temp\450a5777951ba46f37e5587e372e43c847e76b00c370077c367d30af10ef41dc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\iLwyZfL.exe
      C:\Users\Admin\AppData\Local\Temp\iLwyZfL.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\46353f1f.bat" "
        3⤵
          PID:316

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\46353f1f.bat

      Filesize

      189B

      MD5

      477913dc10f6a11c511d4408251765c3

      SHA1

      075cb5eb602af0477cabe674cb13d4b1731f8f37

      SHA256

      4b5ba9b022c14a1674ff32c48911119e16d89fd0af29b9c952299e4f264c990b

      SHA512

      600ad39372100067c84a74bf0cd923b7b640125f58b8077d2799a1e7da76a2ff2e38fa03c95f92bc40ab4aff5b2eb977b2f79403bf3beb662478084fe5955d31

    • C:\Users\Admin\AppData\Local\Temp\iLwyZfL.exe

      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • C:\Users\Admin\AppData\Local\Temp\iLwyZfL.exe

      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • \Users\Admin\AppData\Local\Temp\iLwyZfL.exe

      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • \Users\Admin\AppData\Local\Temp\iLwyZfL.exe

      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • memory/1776-64-0x0000000000230000-0x0000000000239000-memory.dmp

      Filesize

      36KB

    • memory/1776-67-0x0000000000230000-0x0000000000239000-memory.dmp

      Filesize

      36KB

    • memory/2036-61-0x0000000000C40000-0x0000000000C77000-memory.dmp

      Filesize

      220KB

    • memory/2036-63-0x0000000000230000-0x0000000000239000-memory.dmp

      Filesize

      36KB

    • memory/2036-54-0x0000000075521000-0x0000000075523000-memory.dmp

      Filesize

      8KB

    • memory/2036-65-0x0000000000C40000-0x0000000000C77000-memory.dmp

      Filesize

      220KB

    • memory/2036-62-0x0000000000230000-0x0000000000239000-memory.dmp

      Filesize

      36KB