Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2022 21:00

General

  • Target

    8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe

  • Size

    159KB

  • MD5

    116669c194c69dec2238a16c9794e99d

  • SHA1

    a433dd9a553a583191ab6d170ae45e7f852981a1

  • SHA256

    8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e

  • SHA512

    f8ec04190153b4b0d68133d35ec39862a3c2534bb9b7e8fdcf4774baf62a3c52826d7eedd74993725ae5b87f6538ae97f32e9a3f13d1cf31871a4f1843e92dab

  • SSDEEP

    3072:+iFx+MrcRKO6ZWpY+38pa6XZNkPN9VBACgg7gy0J:+iFI7RKOj5gbXZNk9w4gZJ

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 23 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe
    "C:\Users\Admin\AppData\Local\Temp\8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\0.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:984
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c dir /s /b "*.doc" "*.xls" "*.txt" "*.ppt" "*.docx" "*.xlsx" "*.pptx" "*.pdf" "*.mlf" "*.jpg" "*.png" "*.bmp"
        3⤵
          PID:888
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log.txt"
          3⤵
          • Executes dropped EXE
          PID:768
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\dd_SetupUtility.txt"
          3⤵
          • Executes dropped EXE
          PID:892
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI640E.txt"
          3⤵
          • Executes dropped EXE
          PID:2000
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI6476.txt"
          3⤵
          • Executes dropped EXE
          PID:1532
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI640E.txt"
          3⤵
          • Executes dropped EXE
          PID:884
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI6476.txt"
          3⤵
          • Executes dropped EXE
          PID:1456
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\dd_wcf_CA_smci_20220901_133527_258.txt"
          3⤵
          • Executes dropped EXE
          PID:1552
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\dd_wcf_CA_smci_20220901_133528_724.txt"
          3⤵
          • Executes dropped EXE
          PID:1980
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\FXSAPIDebugLogFile.txt"
          3⤵
          • Executes dropped EXE
          PID:1964
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\Microsoft .NET Framework 4.7.2 Setup_20220901_133503561-MSI_netfx_Full_x64.msi.txt"
          3⤵
          • Executes dropped EXE
          PID:588
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\Admin.bmp"
          3⤵
          • Executes dropped EXE
          PID:1528
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c dir /s /b "*_*.doc" "*.xls" "*_*.txt" "*_*.ppt" "*_*.docx" "*_*.xlsx" "*_*.pptx" "*_*.pdf" "*_*.mlf" "*_*.jpg" "*_*.png" "*_*.bmp"
          3⤵
            PID:1524
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 3 127.0.0.1
            3⤵
            • Runs ping.exe
            PID:1656

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\0.bat

        Filesize

        1KB

        MD5

        1495442e7e355dc5241fb2fafa936db6

        SHA1

        4ebf68683fedda6b969b6f772fc2eb5abd2ae8dd

        SHA256

        d434dc558dd8a797c26f86a6743e4072f48d822664a9d340f1525545792ec795

        SHA512

        d57976738592f03756925bb0dae102f383b267d1b94517fb493e29d22b5b56fd0ee9839f0279030d834d15950c07e0d73145467350205a56e5a73ba8b1f7368d

      • C:\Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • \Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • \Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • \Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • \Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • \Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • \Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • \Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • \Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • \Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • \Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • \Users\Admin\AppData\Local\Temp\1.exe

        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • memory/588-131-0x0000000000970000-0x000000000099F000-memory.dmp

        Filesize

        188KB

      • memory/588-132-0x0000000000970000-0x000000000099F000-memory.dmp

        Filesize

        188KB

      • memory/588-134-0x0000000000970000-0x000000000099F000-memory.dmp

        Filesize

        188KB

      • memory/768-66-0x0000000001100000-0x000000000112F000-memory.dmp

        Filesize

        188KB

      • memory/768-67-0x0000000001100000-0x000000000112F000-memory.dmp

        Filesize

        188KB

      • memory/768-65-0x0000000001100000-0x000000000112F000-memory.dmp

        Filesize

        188KB

      • memory/884-93-0x0000000001170000-0x000000000119F000-memory.dmp

        Filesize

        188KB

      • memory/884-97-0x0000000001170000-0x000000000119F000-memory.dmp

        Filesize

        188KB

      • memory/884-98-0x0000000001170000-0x000000000119F000-memory.dmp

        Filesize

        188KB

      • memory/892-74-0x0000000001100000-0x000000000112F000-memory.dmp

        Filesize

        188KB

      • memory/984-148-0x0000000000970000-0x000000000099F000-memory.dmp

        Filesize

        188KB

      • memory/984-146-0x0000000000970000-0x000000000099F000-memory.dmp

        Filesize

        188KB

      • memory/984-147-0x0000000000120000-0x000000000014F000-memory.dmp

        Filesize

        188KB

      • memory/984-95-0x0000000000120000-0x000000000014F000-memory.dmp

        Filesize

        188KB

      • memory/1048-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

        Filesize

        8KB

      • memory/1048-133-0x0000000000400000-0x000000000043F000-memory.dmp

        Filesize

        252KB

      • memory/1048-94-0x0000000000400000-0x000000000043F000-memory.dmp

        Filesize

        252KB

      • memory/1456-104-0x00000000013A0000-0x00000000013CF000-memory.dmp

        Filesize

        188KB

      • memory/1456-103-0x00000000013A0000-0x00000000013CF000-memory.dmp

        Filesize

        188KB

      • memory/1456-105-0x00000000013A0000-0x00000000013CF000-memory.dmp

        Filesize

        188KB

      • memory/1528-141-0x0000000000970000-0x000000000099F000-memory.dmp

        Filesize

        188KB

      • memory/1528-140-0x0000000000970000-0x000000000099F000-memory.dmp

        Filesize

        188KB

      • memory/1528-139-0x0000000000970000-0x000000000099F000-memory.dmp

        Filesize

        188KB

      • memory/1532-86-0x0000000001170000-0x000000000119F000-memory.dmp

        Filesize

        188KB

      • memory/1532-88-0x0000000001170000-0x000000000119F000-memory.dmp

        Filesize

        188KB

      • memory/1532-87-0x0000000001170000-0x000000000119F000-memory.dmp

        Filesize

        188KB

      • memory/1552-110-0x0000000000160000-0x000000000018F000-memory.dmp

        Filesize

        188KB

      • memory/1552-112-0x0000000000160000-0x000000000018F000-memory.dmp

        Filesize

        188KB

      • memory/1552-111-0x0000000000160000-0x000000000018F000-memory.dmp

        Filesize

        188KB

      • memory/1964-125-0x0000000000970000-0x000000000099F000-memory.dmp

        Filesize

        188KB

      • memory/1964-126-0x0000000000970000-0x000000000099F000-memory.dmp

        Filesize

        188KB

      • memory/1964-124-0x0000000000970000-0x000000000099F000-memory.dmp

        Filesize

        188KB

      • memory/1980-119-0x0000000000010000-0x000000000003F000-memory.dmp

        Filesize

        188KB

      • memory/1980-118-0x0000000000010000-0x000000000003F000-memory.dmp

        Filesize

        188KB

      • memory/1980-117-0x0000000000010000-0x000000000003F000-memory.dmp

        Filesize

        188KB

      • memory/2000-81-0x00000000001A0000-0x00000000001CF000-memory.dmp

        Filesize

        188KB

      • memory/2000-80-0x00000000001A0000-0x00000000001CF000-memory.dmp

        Filesize

        188KB

      • memory/2000-79-0x00000000001A0000-0x00000000001CF000-memory.dmp

        Filesize

        188KB