Analysis

  • max time kernel
    110s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 23:40

General

  • Target

    06b895e8d7f5f1c71393ef37967090836a5d2b33b16f6e035397690abeda392a.exe

  • Size

    698KB

  • MD5

    a1b98369bfe9e349f6623fb86288314f

  • SHA1

    494664da0fab49d06dc44bd4f7c4b79b307f44e8

  • SHA256

    06b895e8d7f5f1c71393ef37967090836a5d2b33b16f6e035397690abeda392a

  • SHA512

    1572afa0da5c6f0ec980535f310785e3dc4ebbd3689eb582fc2e5d6ecdfb2ea0690096e8e95b5adeea59436d9f5bc9ac00ada3d65d2e80cc52b6372aed621313

  • SSDEEP

    12288:pyV/o9AILJQGiL8tIolYvvXFUIhIa59LGyyHNGFyjYXD6dDTmcvmiYS:4qvZiCIukLhpfGjHNGFrT6dnDX

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops startup file 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06b895e8d7f5f1c71393ef37967090836a5d2b33b16f6e035397690abeda392a.exe
    "C:\Users\Admin\AppData\Local\Temp\06b895e8d7f5f1c71393ef37967090836a5d2b33b16f6e035397690abeda392a.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Users\Admin\AppData\Roaming\windows\video8193.dll
      C:\Users\Admin\AppData\Roaming\windows\video8193.dll
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2032
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 1020
      2⤵
      • Program crash
      PID:536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\windows\video8193.dll

    Filesize

    28KB

    MD5

    b9ac487f5a9fbfdce09a9ab15ff604e8

    SHA1

    b01489e4055c6c1a66602f15b1f8bab0d82cdadf

    SHA256

    80f95de10e11c2f7b1bc2c116958eb6eee2f1dfcb731a648bb6f2f94ac013fec

    SHA512

    5e2d9d124db9b7099ba40c1be4ac12022df1a3b6515b62a7506a3dd937887b542f97f76d748e5a54e7e2cd018d7175ed2870dc12ef4183eb0c8e5135a970bfec

  • \Users\Admin\AppData\Roaming\windows\video8193.dll

    Filesize

    28KB

    MD5

    b9ac487f5a9fbfdce09a9ab15ff604e8

    SHA1

    b01489e4055c6c1a66602f15b1f8bab0d82cdadf

    SHA256

    80f95de10e11c2f7b1bc2c116958eb6eee2f1dfcb731a648bb6f2f94ac013fec

    SHA512

    5e2d9d124db9b7099ba40c1be4ac12022df1a3b6515b62a7506a3dd937887b542f97f76d748e5a54e7e2cd018d7175ed2870dc12ef4183eb0c8e5135a970bfec

  • \Users\Admin\AppData\Roaming\windows\video8193.dll

    Filesize

    28KB

    MD5

    b9ac487f5a9fbfdce09a9ab15ff604e8

    SHA1

    b01489e4055c6c1a66602f15b1f8bab0d82cdadf

    SHA256

    80f95de10e11c2f7b1bc2c116958eb6eee2f1dfcb731a648bb6f2f94ac013fec

    SHA512

    5e2d9d124db9b7099ba40c1be4ac12022df1a3b6515b62a7506a3dd937887b542f97f76d748e5a54e7e2cd018d7175ed2870dc12ef4183eb0c8e5135a970bfec

  • memory/848-54-0x0000000075601000-0x0000000075603000-memory.dmp

    Filesize

    8KB

  • memory/848-55-0x0000000000400000-0x0000000000542000-memory.dmp

    Filesize

    1.3MB

  • memory/848-60-0x0000000001F90000-0x0000000001FA0000-memory.dmp

    Filesize

    64KB

  • memory/848-62-0x0000000000400000-0x0000000000542000-memory.dmp

    Filesize

    1.3MB

  • memory/848-63-0x0000000001F90000-0x0000000001FA0000-memory.dmp

    Filesize

    64KB