Analysis

  • max time kernel
    142s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 16:13

General

  • Target

    e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe

  • Size

    279KB

  • MD5

    764095681a71843f6557b20b2dd3e610

  • SHA1

    df6a41a5a399d8177a653050ed7279deecaf7111

  • SHA256

    e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791

  • SHA512

    34d8cf50d1a828afb66195de322ff70a846b1ad0e8c353e937bc45a6c84ce0665ada5f68f0b0d9ec2f66d6637c9575319cf855e9104d67b78b47b2c1d8494704

  • SSDEEP

    6144:BzfDEaJynqYISIkBKmNU4lTGxyU18cBDPxFbvoasaq09lQkOtqGeb:t2zIpkkOlicUhNbvoIq0YkOtqPb

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe
    "C:\Users\Admin\AppData\Local\Temp\e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\nsy6212.tmp
      C:\Users\Admin\AppData\Local\Temp\nsy6212.tmp /idn
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:592

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsy6212.tmp

    Filesize

    223KB

    MD5

    8d081fcbec1ca7d30487291a6303d775

    SHA1

    65397f9690387db8a9108b16ea2b2d7fca8fbcfd

    SHA256

    0c87d2a2bde94a00dbd13c44686a8b80681857320e46e6bdef0d6060fcd61837

    SHA512

    1f8664883b63cf41eae659b3bffd83f200641d8887dc30f4bdca2a19c30625fd03e3a02cff9138f36b4a215ceba25ee26ec1e675e8be3aa473a2cc5e3c2961f5

  • C:\Users\Admin\AppData\Local\Temp\nsy6212.tmp

    Filesize

    223KB

    MD5

    8d081fcbec1ca7d30487291a6303d775

    SHA1

    65397f9690387db8a9108b16ea2b2d7fca8fbcfd

    SHA256

    0c87d2a2bde94a00dbd13c44686a8b80681857320e46e6bdef0d6060fcd61837

    SHA512

    1f8664883b63cf41eae659b3bffd83f200641d8887dc30f4bdca2a19c30625fd03e3a02cff9138f36b4a215ceba25ee26ec1e675e8be3aa473a2cc5e3c2961f5

  • \Users\Admin\AppData\Local\Temp\nso4667.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

  • \Users\Admin\AppData\Local\Temp\nso4667.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

  • \Users\Admin\AppData\Local\Temp\nso4667.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

  • \Users\Admin\AppData\Local\Temp\nso4667.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

  • \Users\Admin\AppData\Local\Temp\nst6329.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

  • \Users\Admin\AppData\Local\Temp\nst6329.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

  • \Users\Admin\AppData\Local\Temp\nst6329.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

  • \Users\Admin\AppData\Local\Temp\nst6329.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

  • \Users\Admin\AppData\Local\Temp\nsy6212.tmp

    Filesize

    223KB

    MD5

    8d081fcbec1ca7d30487291a6303d775

    SHA1

    65397f9690387db8a9108b16ea2b2d7fca8fbcfd

    SHA256

    0c87d2a2bde94a00dbd13c44686a8b80681857320e46e6bdef0d6060fcd61837

    SHA512

    1f8664883b63cf41eae659b3bffd83f200641d8887dc30f4bdca2a19c30625fd03e3a02cff9138f36b4a215ceba25ee26ec1e675e8be3aa473a2cc5e3c2961f5

  • memory/1632-54-0x0000000075B41000-0x0000000075B43000-memory.dmp

    Filesize

    8KB