Analysis

  • max time kernel
    41s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 02:54

General

  • Target

    7dd73b54e923ac4a74349b9e3e3d827adf2427d924e3da3317827570a9d5a1ff.exe

  • Size

    94KB

  • MD5

    3b6c2dd37e7e000c5e0f0b5612a57bb1

  • SHA1

    ebc78722dd54bc72278ad59eb140212610564084

  • SHA256

    7dd73b54e923ac4a74349b9e3e3d827adf2427d924e3da3317827570a9d5a1ff

  • SHA512

    1da907bacadd4fb54b091bb6a8fe21af78c65188ec87a627a00436f9482140664ba785aab25629d1da6531ae3453b92cfd1e5810747ddf53e727db40e2039111

  • SSDEEP

    1536:kRYpHXbpdF1XJfHM3S0DamJrCFiT9pBwS9tr3bT0pYaEdmLt43mRpn3K:aY3dFNJPmDamJrCU/bT0paCp3K

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7dd73b54e923ac4a74349b9e3e3d827adf2427d924e3da3317827570a9d5a1ff.exe
    "C:\Users\Admin\AppData\Local\Temp\7dd73b54e923ac4a74349b9e3e3d827adf2427d924e3da3317827570a9d5a1ff.exe"
    1⤵
    • Loads dropped DLL
    PID:832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsyFDD1.tmp\Md5dll.dll

    Filesize

    8KB

    MD5

    a7d710e78711d5ab90e4792763241754

    SHA1

    f31cecd926c5d497aba163a17b75975ec34beb13

    SHA256

    9b05dd603f13c196f3f21c43f48834208fed2294f7090fcd1334931014611fb2

    SHA512

    f0ca2d6f9a8aeac84ef8b051154a041adffc46e3e9aced142e9c7bf5f7272b047e1db421d38cb2d9182d7442bee3dd806618b019ec042a23ae0e71671d2943c0

  • \Users\Admin\AppData\Local\Temp\nsyFDD1.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    9c90c746adae5171c52b932080113331

    SHA1

    2eb66e61ad38a33aa6e6c245e84e0a78dfcc5460

    SHA256

    5b7be83ff4f023eba8d2d7ab972b067a904adc71f56a50cb367619cd116d0e92

    SHA512

    fca06b4b39fdd76002487a4f9a454bec5507b2355a0e4e2dfe044e2def52bbd01aa5d2a0077703f7b8814b248743fac2b84fd37f611e04281f7e5c428e245565

  • \Users\Admin\AppData\Local\Temp\nsyFDD1.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    9c90c746adae5171c52b932080113331

    SHA1

    2eb66e61ad38a33aa6e6c245e84e0a78dfcc5460

    SHA256

    5b7be83ff4f023eba8d2d7ab972b067a904adc71f56a50cb367619cd116d0e92

    SHA512

    fca06b4b39fdd76002487a4f9a454bec5507b2355a0e4e2dfe044e2def52bbd01aa5d2a0077703f7b8814b248743fac2b84fd37f611e04281f7e5c428e245565

  • \Users\Admin\AppData\Local\Temp\nsyFDD1.tmp\System.dll

    Filesize

    11KB

    MD5

    c6f5b9596db45ce43f14b64e0fbcf552

    SHA1

    665a2207a643726602dc3e845e39435868dddabc

    SHA256

    4b6da3f2bdb6c452fb493b98f6b7aa1171787dbd3fa2df2b3b22ccaeac88ffa0

    SHA512

    8faa0204f9ed2721acede285be843b5a2d7f9986841bcf3816ebc8900910afb590816c64aebd2dd845686daf825bbf9970cb4a08b20a785c7e54542eddc5b09a

  • memory/832-54-0x0000000075921000-0x0000000075923000-memory.dmp

    Filesize

    8KB