Analysis

  • max time kernel
    154s
  • max time network
    70s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2022 03:48

General

  • Target

    Needy Streamer Overload [FitGirl Repack]/fg-01.bin

  • Size

    841.1MB

  • MD5

    b2dece6c55b4e7e1560ce57d5ae0058b

  • SHA1

    03e9b1fcd3f0660cfe9fdb0722f0fb4bd2817fa3

  • SHA256

    00a8c11460214ff1ae21ccdb75e69d2839daa7219038d567d2d9324c1c1cfc1f

  • SHA512

    8025b8d7f6c5eea281876170e6d2c55427fae8a2fd7f4b5c65910882c985d57e7e3851b4f47b3fdf841eddfe4e4710e2d103a50f4e4160f3ab292f75b37ec036

  • SSDEEP

    25165824:fi/eZ+dRpeY88eGSnDNNjftphpUqDBJlm1J:Y4+NJeGSD1p/RBJq

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 10 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Needy Streamer Overload [FitGirl Repack]\fg-01.bin"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Needy Streamer Overload [FitGirl Repack]\fg-01.bin
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Needy Streamer Overload [FitGirl Repack]\fg-01.bin"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/560-82-0x00000000762F1000-0x00000000762F3000-memory.dmp

    Filesize

    8KB

  • memory/2040-54-0x000007FEFC421000-0x000007FEFC423000-memory.dmp

    Filesize

    8KB