Analysis

  • max time kernel
    20s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 06:02

General

  • Target

    551f46eb7a57ce373b8cd0116875d3945183295e3d019a2c706721c25b815618.exe

  • Size

    551KB

  • MD5

    6e6ec3d292326ed217a103377305c500

  • SHA1

    11e2acb5f95ad758fa2c535c0766e81d01404043

  • SHA256

    551f46eb7a57ce373b8cd0116875d3945183295e3d019a2c706721c25b815618

  • SHA512

    5a324f72d19aaf3f56249ebd091837a238a2b143b31e4ed0ed6f547adf5b5e80a7bee19588137e86cb7cb403a9f079c5dc16a496a08d33cb262369fe860c0350

  • SSDEEP

    12288:O7VVfiRuqPW/dgMqIHdjSFnnKCX0nU9Fb:O7VVfi40WlzdjSNnaUvb

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\551f46eb7a57ce373b8cd0116875d3945183295e3d019a2c706721c25b815618.exe
    "C:\Users\Admin\AppData\Local\Temp\551f46eb7a57ce373b8cd0116875d3945183295e3d019a2c706721c25b815618.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Disables RegEdit via registry modification
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C AT /delete /yes
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Windows\SysWOW64\at.exe
        AT /delete /yes
        3⤵
          PID:2008
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\RVHOST.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:796
        • C:\Windows\SysWOW64\at.exe
          AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\RVHOST.exe
          3⤵
            PID:1988

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1324-54-0x0000000075AC1000-0x0000000075AC3000-memory.dmp

        Filesize

        8KB

      • memory/1324-61-0x0000000000400000-0x000000000049A000-memory.dmp

        Filesize

        616KB

      • memory/1324-62-0x0000000000400000-0x000000000049A000-memory.dmp

        Filesize

        616KB