Analysis
-
max time kernel
161s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe
Resource
win10v2004-20220812-en
General
-
Target
ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe
-
Size
541KB
-
MD5
6f9f866ff6a695ce7640b1f0ec6a5dc0
-
SHA1
f0cc35e88d8ebe442d9595ea38ed5da7f5a31775
-
SHA256
ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404
-
SHA512
e757b09bddbc5fbc444b7e276456f42b9850c26ac1e5a0430d8492c3b177e1a4877c5bda32940f62a4cc1bd9d7dbb34817913f97bf6ef13e50af04afa3edbcdc
-
SSDEEP
12288:tVOQcNRBIcArtmiwHnp8neREpu2fR4Z0u19M/:tA7B85wHpueupu2fR7uTM/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1796 setup.exe -
Loads dropped DLL 5 IoCs
pid Process 1264 ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe 1264 ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe 1264 ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe 1264 ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe 1264 ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1796 setup.exe 1796 setup.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1796 1264 ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe 31 PID 1264 wrote to memory of 1796 1264 ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe 31 PID 1264 wrote to memory of 1796 1264 ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe 31 PID 1264 wrote to memory of 1796 1264 ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe"C:\Users\Admin\AppData\Local\Temp\ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\DM\setup.exe"C:\Users\Admin\AppData\Local\Temp\DM\setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD56f9f866ff6a695ce7640b1f0ec6a5dc0
SHA1f0cc35e88d8ebe442d9595ea38ed5da7f5a31775
SHA256ca473f54bd4c34ea40e7e662b9449a9d85b7e844010dad2edf3b9325adad2404
SHA512e757b09bddbc5fbc444b7e276456f42b9850c26ac1e5a0430d8492c3b177e1a4877c5bda32940f62a4cc1bd9d7dbb34817913f97bf6ef13e50af04afa3edbcdc
-
Filesize
102KB
MD5852ebf2750ec8c606b154d8464f91ac7
SHA13f255de0a82ae831e0d580d5805a968609ccdc08
SHA256ae11ceb850659751fc95152696ccd8e4bbaa2908fcd5769651acd965a87d69f6
SHA5127845a8c417f002df013290d9a1beeb41b165051337d7a5443dc0089003cab2fe7990d41345f1077a300689b75bfd07c5689f0f65ef0d06eba6777d242653820f
-
Filesize
102KB
MD5852ebf2750ec8c606b154d8464f91ac7
SHA13f255de0a82ae831e0d580d5805a968609ccdc08
SHA256ae11ceb850659751fc95152696ccd8e4bbaa2908fcd5769651acd965a87d69f6
SHA5127845a8c417f002df013290d9a1beeb41b165051337d7a5443dc0089003cab2fe7990d41345f1077a300689b75bfd07c5689f0f65ef0d06eba6777d242653820f
-
Filesize
102KB
MD5852ebf2750ec8c606b154d8464f91ac7
SHA13f255de0a82ae831e0d580d5805a968609ccdc08
SHA256ae11ceb850659751fc95152696ccd8e4bbaa2908fcd5769651acd965a87d69f6
SHA5127845a8c417f002df013290d9a1beeb41b165051337d7a5443dc0089003cab2fe7990d41345f1077a300689b75bfd07c5689f0f65ef0d06eba6777d242653820f
-
Filesize
102KB
MD5852ebf2750ec8c606b154d8464f91ac7
SHA13f255de0a82ae831e0d580d5805a968609ccdc08
SHA256ae11ceb850659751fc95152696ccd8e4bbaa2908fcd5769651acd965a87d69f6
SHA5127845a8c417f002df013290d9a1beeb41b165051337d7a5443dc0089003cab2fe7990d41345f1077a300689b75bfd07c5689f0f65ef0d06eba6777d242653820f
-
Filesize
102KB
MD5852ebf2750ec8c606b154d8464f91ac7
SHA13f255de0a82ae831e0d580d5805a968609ccdc08
SHA256ae11ceb850659751fc95152696ccd8e4bbaa2908fcd5769651acd965a87d69f6
SHA5127845a8c417f002df013290d9a1beeb41b165051337d7a5443dc0089003cab2fe7990d41345f1077a300689b75bfd07c5689f0f65ef0d06eba6777d242653820f
-
Filesize
102KB
MD5852ebf2750ec8c606b154d8464f91ac7
SHA13f255de0a82ae831e0d580d5805a968609ccdc08
SHA256ae11ceb850659751fc95152696ccd8e4bbaa2908fcd5769651acd965a87d69f6
SHA5127845a8c417f002df013290d9a1beeb41b165051337d7a5443dc0089003cab2fe7990d41345f1077a300689b75bfd07c5689f0f65ef0d06eba6777d242653820f