Analysis

  • max time kernel
    36s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2022 09:01

General

  • Target

    e3c73aec3580e4135ba97dd13c70a7a76391f69ab039f59091894077f0bb6f46.exe

  • Size

    1.9MB

  • MD5

    0e5ac8b47a4dcef9b591c46cd59ff373

  • SHA1

    a974f78751e250ad6b348fa7e46ebddba8a7d006

  • SHA256

    e3c73aec3580e4135ba97dd13c70a7a76391f69ab039f59091894077f0bb6f46

  • SHA512

    343dfe8b0af9e8524ea4963496b12bc834505feaecc9ef2dbe8d86aecc1167278669147c7ce89633e34407c0aaeab6e27997a608621c52c4b86ee2f5d02c9c50

  • SSDEEP

    49152:qu/k9bTChxKCnFnQXBbrtgb/iQvu0UHOa/U:Hk96hxvWbrtUTrUHOz

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3c73aec3580e4135ba97dd13c70a7a76391f69ab039f59091894077f0bb6f46.exe
    "C:\Users\Admin\AppData\Local\Temp\e3c73aec3580e4135ba97dd13c70a7a76391f69ab039f59091894077f0bb6f46.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1892
      • C:\Users\Admin\AppData\Local\Temp\@AE34E7.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\@AE34E7.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1472
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1152
          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:656
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1480
              • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 656
                7⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:284
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1068
                  • C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                    "C:\Users\Admin\AppData\Local\Temp\wtmps.exe"
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of WriteProcessMemory
                    PID:1596
                    • C:\Windows\SysWOW64\mscaps.exe
                      "C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                      10⤵
                      • Executes dropped EXE
                      PID:1484
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
          4⤵
            PID:1712
        • C:\Users\Admin\AppData\Local\Temp\e3c73aec3580e4135ba97dd13c70a7a76391f69ab039f59091894077f0bb6f46.exe
          "C:\Users\Admin\AppData\Local\Temp\e3c73aec3580e4135ba97dd13c70a7a76391f69ab039f59091894077f0bb6f46.exe"
          3⤵
          • Executes dropped EXE
          PID:1668

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\@AE34E7.tmp.exe

      Filesize

      1.7MB

      MD5

      09fea29890a1580235eb9fbe1f1bba3c

      SHA1

      4a91d8836268aac00f5cb3fb4a0d8dbc65ea95b7

      SHA256

      a3bed5a87e9d051d50a524d361bd785104742f6e683453c9f13a7cc5e45262a1

      SHA512

      c8f5156c2ba4b3820e14ccc2b01fca9eaf5605e7b21def4f718a7c179be415d2dd9bc0d63427b587aa9402e4138c689f22b35ef6ac82f4a5713c71ae2b1296cc

    • C:\Users\Admin\AppData\Local\Temp\@AE34E7.tmp.exe

      Filesize

      1.7MB

      MD5

      09fea29890a1580235eb9fbe1f1bba3c

      SHA1

      4a91d8836268aac00f5cb3fb4a0d8dbc65ea95b7

      SHA256

      a3bed5a87e9d051d50a524d361bd785104742f6e683453c9f13a7cc5e45262a1

      SHA512

      c8f5156c2ba4b3820e14ccc2b01fca9eaf5605e7b21def4f718a7c179be415d2dd9bc0d63427b587aa9402e4138c689f22b35ef6ac82f4a5713c71ae2b1296cc

    • C:\Users\Admin\AppData\Local\Temp\e3c73aec3580e4135ba97dd13c70a7a76391f69ab039f59091894077f0bb6f46.exe

      Filesize

      164KB

      MD5

      cc3374db4a64d880f7383774e12cbe7d

      SHA1

      32bd0f34f2132c25b2e9f6e0a926d9a69910e209

      SHA256

      e710f8beedc6c6d255114fe7710eb7065af6241ef3c513f703abff87bb8a448f

      SHA512

      fd8e4a2867a4627a239129a51901b97ce3c6205a7cb2aeaf9af8538247011de7e56d7a2665d8e6b15b459c8fb634a1d32ff31aaa64dd846a931f240796ccbcfb

    • C:\Users\Admin\AppData\Local\Temp\wtmps.exe

      Filesize

      276KB

      MD5

      75c1467042b38332d1ea0298f29fb592

      SHA1

      f92ea770c2ddb04cf0d20914578e4c482328f0f8

      SHA256

      3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

      SHA512

      5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

    • C:\Users\Admin\AppData\Local\Temp\wtmps.exe

      Filesize

      276KB

      MD5

      75c1467042b38332d1ea0298f29fb592

      SHA1

      f92ea770c2ddb04cf0d20914578e4c482328f0f8

      SHA256

      3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

      SHA512

      5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

      Filesize

      172KB

      MD5

      daac1781c9d22f5743ade0cb41feaebf

      SHA1

      e2549eeeea42a6892b89d354498fcaa8ffd9cac4

      SHA256

      6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

      SHA512

      190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

    • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

      Filesize

      172KB

      MD5

      daac1781c9d22f5743ade0cb41feaebf

      SHA1

      e2549eeeea42a6892b89d354498fcaa8ffd9cac4

      SHA256

      6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

      SHA512

      190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

    • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

      Filesize

      1.7MB

      MD5

      8a9b42be06872ce11ab17d05859d0868

      SHA1

      1110f0e863024a281060932d6c19c33913d724ff

      SHA256

      2f46db38fff95cf67a7df2f5965664ec3e7310451652a5f5e3b60899d4e745f4

      SHA512

      3f04065bfd9dcb2aa3af762835c16c43d84a2cbb62fcfb9b77d305009a5c5dbb334cbba62128ccc713a9afec0a46cb73725c695f45fc749e634bfd1f1ed9fae7

    • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

      Filesize

      1.7MB

      MD5

      8a9b42be06872ce11ab17d05859d0868

      SHA1

      1110f0e863024a281060932d6c19c33913d724ff

      SHA256

      2f46db38fff95cf67a7df2f5965664ec3e7310451652a5f5e3b60899d4e745f4

      SHA512

      3f04065bfd9dcb2aa3af762835c16c43d84a2cbb62fcfb9b77d305009a5c5dbb334cbba62128ccc713a9afec0a46cb73725c695f45fc749e634bfd1f1ed9fae7

    • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

      Filesize

      129B

      MD5

      d1073c9b34d1bbd570928734aacff6a5

      SHA1

      78714e24e88d50e0da8da9d303bec65b2ee6d903

      SHA256

      b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

      SHA512

      4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

    • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

      Filesize

      102B

      MD5

      1d68f046cd6a9197038fb2445d2bea05

      SHA1

      d8dca54cfa0b2ad404bce32d5d94634bcfc9b2d7

      SHA256

      9cddd4b2ac719f01052deef3aa558fbfbcd21d5728215651345c3d2b9ba250d9

      SHA512

      2720d071fd02b2cf0d9f1de8dd19117fd128f213dd7f66fa8adb00d7873a5de58d2f2618100d28eec85db707d9e34d20258f9a1f76acf75fe668e66722e1cc4c

    • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

      Filesize

      125B

      MD5

      78767917fff3a63c1537f6e2ede53b6d

      SHA1

      74e83e927133c955ea49885a72b92c5ab46c53d4

      SHA256

      3738962ece9067ff419eccf05b5dc38f0fdc6cf047d927daf08e955ce607764a

      SHA512

      50ed5905bb5ed7237c5216b4641526c323f0aedbaf267c89b1791a748725b76970a7bad53ce8874eb2567e921d36a6949eef24ff79dcddc26d24737f807adff3

    • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

      Filesize

      196B

      MD5

      89c8aaeba78bc211e5ba34c4acae1c99

      SHA1

      b950090e295df94ba75b3695bab08a0326d22501

      SHA256

      141c801a733c87752ece5b9d4438505d4c80c18bf3bbdb241c039098cc0f323d

      SHA512

      16c764596bfe98394ab4bd7a220f6608150d3882f11eb007f5140db0b398ccfe20750d2dd1772c90489c364c35e0e15ed803fbe220d3b1c977aaa28d15227674

    • C:\Windows\SysWOW64\mscaps.exe

      Filesize

      200KB

      MD5

      78d3c8705f8baf7d34e6a6737d1cfa18

      SHA1

      9f09e248a29311dbeefae9d85937b13da042a010

      SHA256

      2c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905

      SHA512

      9a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609

    • \Users\Admin\AppData\Local\Temp\@AE34E7.tmp.exe

      Filesize

      1.7MB

      MD5

      09fea29890a1580235eb9fbe1f1bba3c

      SHA1

      4a91d8836268aac00f5cb3fb4a0d8dbc65ea95b7

      SHA256

      a3bed5a87e9d051d50a524d361bd785104742f6e683453c9f13a7cc5e45262a1

      SHA512

      c8f5156c2ba4b3820e14ccc2b01fca9eaf5605e7b21def4f718a7c179be415d2dd9bc0d63427b587aa9402e4138c689f22b35ef6ac82f4a5713c71ae2b1296cc

    • \Users\Admin\AppData\Local\Temp\@AE34E7.tmp.exe

      Filesize

      1.7MB

      MD5

      09fea29890a1580235eb9fbe1f1bba3c

      SHA1

      4a91d8836268aac00f5cb3fb4a0d8dbc65ea95b7

      SHA256

      a3bed5a87e9d051d50a524d361bd785104742f6e683453c9f13a7cc5e45262a1

      SHA512

      c8f5156c2ba4b3820e14ccc2b01fca9eaf5605e7b21def4f718a7c179be415d2dd9bc0d63427b587aa9402e4138c689f22b35ef6ac82f4a5713c71ae2b1296cc

    • \Users\Admin\AppData\Local\Temp\e3c73aec3580e4135ba97dd13c70a7a76391f69ab039f59091894077f0bb6f46.exe

      Filesize

      164KB

      MD5

      cc3374db4a64d880f7383774e12cbe7d

      SHA1

      32bd0f34f2132c25b2e9f6e0a926d9a69910e209

      SHA256

      e710f8beedc6c6d255114fe7710eb7065af6241ef3c513f703abff87bb8a448f

      SHA512

      fd8e4a2867a4627a239129a51901b97ce3c6205a7cb2aeaf9af8538247011de7e56d7a2665d8e6b15b459c8fb634a1d32ff31aaa64dd846a931f240796ccbcfb

    • \Users\Admin\AppData\Local\Temp\e3c73aec3580e4135ba97dd13c70a7a76391f69ab039f59091894077f0bb6f46.exe

      Filesize

      164KB

      MD5

      cc3374db4a64d880f7383774e12cbe7d

      SHA1

      32bd0f34f2132c25b2e9f6e0a926d9a69910e209

      SHA256

      e710f8beedc6c6d255114fe7710eb7065af6241ef3c513f703abff87bb8a448f

      SHA512

      fd8e4a2867a4627a239129a51901b97ce3c6205a7cb2aeaf9af8538247011de7e56d7a2665d8e6b15b459c8fb634a1d32ff31aaa64dd846a931f240796ccbcfb

    • \Users\Admin\AppData\Local\Temp\wtmps.exe

      Filesize

      276KB

      MD5

      75c1467042b38332d1ea0298f29fb592

      SHA1

      f92ea770c2ddb04cf0d20914578e4c482328f0f8

      SHA256

      3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

      SHA512

      5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

    • \Users\Admin\AppData\Local\Temp\wtmps.exe

      Filesize

      276KB

      MD5

      75c1467042b38332d1ea0298f29fb592

      SHA1

      f92ea770c2ddb04cf0d20914578e4c482328f0f8

      SHA256

      3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

      SHA512

      5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

    • \Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

      Filesize

      172KB

      MD5

      daac1781c9d22f5743ade0cb41feaebf

      SHA1

      e2549eeeea42a6892b89d354498fcaa8ffd9cac4

      SHA256

      6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

      SHA512

      190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

    • \Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

      Filesize

      172KB

      MD5

      daac1781c9d22f5743ade0cb41feaebf

      SHA1

      e2549eeeea42a6892b89d354498fcaa8ffd9cac4

      SHA256

      6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

      SHA512

      190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

    • \Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

      Filesize

      1.7MB

      MD5

      8a9b42be06872ce11ab17d05859d0868

      SHA1

      1110f0e863024a281060932d6c19c33913d724ff

      SHA256

      2f46db38fff95cf67a7df2f5965664ec3e7310451652a5f5e3b60899d4e745f4

      SHA512

      3f04065bfd9dcb2aa3af762835c16c43d84a2cbb62fcfb9b77d305009a5c5dbb334cbba62128ccc713a9afec0a46cb73725c695f45fc749e634bfd1f1ed9fae7

    • \Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

      Filesize

      1.7MB

      MD5

      8a9b42be06872ce11ab17d05859d0868

      SHA1

      1110f0e863024a281060932d6c19c33913d724ff

      SHA256

      2f46db38fff95cf67a7df2f5965664ec3e7310451652a5f5e3b60899d4e745f4

      SHA512

      3f04065bfd9dcb2aa3af762835c16c43d84a2cbb62fcfb9b77d305009a5c5dbb334cbba62128ccc713a9afec0a46cb73725c695f45fc749e634bfd1f1ed9fae7

    • \Users\Admin\AppData\Roaming\Temp\mydll.dll

      Filesize

      202KB

      MD5

      7ff15a4f092cd4a96055ba69f903e3e9

      SHA1

      a3d338a38c2b92f95129814973f59446668402a8

      SHA256

      1b594e6d057c632abb3a8cf838157369024bd6b9f515ca8e774b22fe71a11627

      SHA512

      4b015d011c14c7e10568c09bf81894681535efb7d76c3ef9071fffb3837f62b36e695187b2d32581a30f07e79971054e231a2ca4e8ad7f0f83d5876f8c086dae

    • \Users\Admin\AppData\Roaming\Temp\mydll.dll

      Filesize

      202KB

      MD5

      7ff15a4f092cd4a96055ba69f903e3e9

      SHA1

      a3d338a38c2b92f95129814973f59446668402a8

      SHA256

      1b594e6d057c632abb3a8cf838157369024bd6b9f515ca8e774b22fe71a11627

      SHA512

      4b015d011c14c7e10568c09bf81894681535efb7d76c3ef9071fffb3837f62b36e695187b2d32581a30f07e79971054e231a2ca4e8ad7f0f83d5876f8c086dae

    • memory/284-97-0x0000000010000000-0x0000000010015000-memory.dmp

      Filesize

      84KB

    • memory/284-94-0x0000000000000000-mapping.dmp

    • memory/656-82-0x0000000000000000-mapping.dmp

    • memory/900-54-0x0000000075C61000-0x0000000075C63000-memory.dmp

      Filesize

      8KB

    • memory/1068-100-0x0000000000000000-mapping.dmp

    • memory/1152-75-0x0000000000000000-mapping.dmp

    • memory/1472-64-0x0000000010000000-0x0000000010015000-memory.dmp

      Filesize

      84KB

    • memory/1472-61-0x0000000000000000-mapping.dmp

    • memory/1480-89-0x0000000000000000-mapping.dmp

    • memory/1484-109-0x0000000000000000-mapping.dmp

    • memory/1596-106-0x0000000000000000-mapping.dmp

    • memory/1668-69-0x0000000000000000-mapping.dmp

    • memory/1712-76-0x0000000000000000-mapping.dmp

    • memory/1892-73-0x0000000000A90000-0x0000000000D11000-memory.dmp

      Filesize

      2.5MB

    • memory/1892-58-0x00000000754C1000-0x00000000754C3000-memory.dmp

      Filesize

      8KB

    • memory/1892-56-0x0000000000000000-mapping.dmp

    • memory/1892-55-0x0000000000AC1000-0x0000000000AC2000-memory.dmp

      Filesize

      4KB