Analysis

  • max time kernel
    151s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 20:56

General

  • Target

    0270c6f93258e6b7c079c1dd0114ebf8846bd5a3a1cd375b875195a280bada05.exe

  • Size

    229KB

  • MD5

    a0d620a0cab01b9dc1e505c2d6a810b0

  • SHA1

    5e5bf4e666b8c1746fbd5ee9e578e75ffcc454d7

  • SHA256

    0270c6f93258e6b7c079c1dd0114ebf8846bd5a3a1cd375b875195a280bada05

  • SHA512

    b30a84baae78e730d836c720cdf4de69c48a81709466adce7df80fc33526faeecf34103a4b8528824805014d0ea70b5367a43b4714218c307cc242017338345c

  • SSDEEP

    3072:2DPhT7lKbVfldRMtyyYyzwCv2gs3+7K75pP:2DR7lKbtlMg/yzNG+7K75pP

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1432
      • C:\Users\Admin\AppData\Local\Temp\0270c6f93258e6b7c079c1dd0114ebf8846bd5a3a1cd375b875195a280bada05.exe
        "C:\Users\Admin\AppData\Local\Temp\0270c6f93258e6b7c079c1dd0114ebf8846bd5a3a1cd375b875195a280bada05.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:948
        • C:\Users\Admin\AppData\Local\Temp\0270c6f93258e6b7c079c1dd0114ebf8846bd5a3a1cd375b875195a280bada05.exe
          "C:\Users\Admin\AppData\Local\Temp\0270c6f93258e6b7c079c1dd0114ebf8846bd5a3a1cd375b875195a280bada05.exe"
          3⤵
            PID:1484

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/948-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

        Filesize

        8KB

      • memory/948-59-0x0000000001000000-0x0000000001040000-memory.dmp

        Filesize

        256KB

      • memory/948-60-0x0000000000630000-0x0000000000670000-memory.dmp

        Filesize

        256KB

      • memory/948-63-0x0000000001000000-0x0000000001040000-memory.dmp

        Filesize

        256KB

      • memory/1432-57-0x00000000026E0000-0x00000000026E1000-memory.dmp

        Filesize

        4KB

      • memory/1484-61-0x0000000001000000-0x0000000001040000-memory.dmp

        Filesize

        256KB

      • memory/1484-62-0x0000000001000000-0x0000000001040000-memory.dmp

        Filesize

        256KB