Analysis

  • max time kernel
    166s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 03:47

General

  • Target

    6ecbb6c797a2706d8f8f8396274627cf16ae5990157c8e2dedfcdf0e12ae6817.exe

  • Size

    864KB

  • MD5

    645b403dd3002b6ddbd05a9719749120

  • SHA1

    a934f7fb373ab7635edfd44c9d75e57cdc86555b

  • SHA256

    6ecbb6c797a2706d8f8f8396274627cf16ae5990157c8e2dedfcdf0e12ae6817

  • SHA512

    598bb8d9373195f176ea48eb5369427b2d035efb25e17df5d0977c3e92130631d3fcd23cfc5891ea0b11bf57ca1b7ff569f093feb49c766946769c84151d1dc0

  • SSDEEP

    24576:71/aGLDCM4D8ayGMZo8/ZShm1j0UG9RC/F:0D8ayGMZoUSEuA

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ecbb6c797a2706d8f8f8396274627cf16ae5990157c8e2dedfcdf0e12ae6817.exe
    "C:\Users\Admin\AppData\Local\Temp\6ecbb6c797a2706d8f8f8396274627cf16ae5990157c8e2dedfcdf0e12ae6817.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\ProgramData\ulqtj.exe
      "C:\ProgramData\ulqtj.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    477KB

    MD5

    71e38cb8371fa644436922e0eee6040d

    SHA1

    6e9e897cb95fd8434891e87a584f5f1b9482cae2

    SHA256

    2c97f31658ca63791439d384a5c4488bdca89adac6c363c2cc97e5763af30db4

    SHA512

    852954de6ce9732c6533d475ebd22f308c5659690d5197dd5865cde0ef740b40f380035baf8d9e6e38dc0541b5f16ffb01ea1560cbb89528ec4b2214c7fcc3be

  • C:\ProgramData\ulqtj.exe

    Filesize

    386KB

    MD5

    c10ccb726e35b6c6909b6d1d340c8a30

    SHA1

    4b655cf4d2ec70c275c4be232fa835ff1287330c

    SHA256

    d21b07338490451fa2addd3efb979f2d7afb798cd70d2350658a7d6fea9e737f

    SHA512

    703b522de5e512c752e30bcdc3ae15608fb975cd289064ee56bc1f7cbf102294cff6e673c3ad1bf457816579ab80177be79fab6cfa37851f1d40d8411c12f3c4

  • C:\ProgramData\ulqtj.exe

    Filesize

    386KB

    MD5

    c10ccb726e35b6c6909b6d1d340c8a30

    SHA1

    4b655cf4d2ec70c275c4be232fa835ff1287330c

    SHA256

    d21b07338490451fa2addd3efb979f2d7afb798cd70d2350658a7d6fea9e737f

    SHA512

    703b522de5e512c752e30bcdc3ae15608fb975cd289064ee56bc1f7cbf102294cff6e673c3ad1bf457816579ab80177be79fab6cfa37851f1d40d8411c12f3c4

  • memory/1964-132-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1964-137-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2804-133-0x0000000000000000-mapping.dmp