Analysis

  • max time kernel
    47s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 03:17

General

  • Target

    22ae5ed3dfaa5d3b199418f2b9648e7f742f3223d7948bc298ebf8c2edf2618a.exe

  • Size

    144KB

  • MD5

    80494e8dc046c051a3613f5df97eb2e1

  • SHA1

    eab828ba9283ea86f1f532e1d0bfd97568e88665

  • SHA256

    22ae5ed3dfaa5d3b199418f2b9648e7f742f3223d7948bc298ebf8c2edf2618a

  • SHA512

    4314e7226851c860ba3776d7126486a88bcd85bb1ccfb3dff7b3f91465cd4bc12f75521e201cb21b79d8e8e5dcfed85fa6618575d3670d4dcc5336c328dce273

  • SSDEEP

    3072:69B1XWAnsOQ6TN1ZgvSRI8jU5713K3qpVPg7dbKToN:41RnsO17MeI8wL3WqpV45bKTo

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22ae5ed3dfaa5d3b199418f2b9648e7f742f3223d7948bc298ebf8c2edf2618a.exe
    "C:\Users\Admin\AppData\Local\Temp\22ae5ed3dfaa5d3b199418f2b9648e7f742f3223d7948bc298ebf8c2edf2618a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\611929c5.exe
      C:\611929c5.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:628
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\7d9c52bf.bat" "
        3⤵
          PID:1624

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\611929c5.exe

            Filesize

            15KB

            MD5

            e351365b4bc9f244b8424288e2cdbcbd

            SHA1

            f2d70670f8d230a59b453ae4cf4738e7675221a2

            SHA256

            d511d476b6777335ed6d1bc3ce7efdf84a91bf04a6514c263c28caec186e09ee

            SHA512

            263f3db3f4d4d7e4d8cfef8663ab9dbebfa3f6606c1eca0fe0fbcaa867e0980617972d1e15c888fd7c849b4d17e457e877991c55ea82c10e8033662e26520864

          • C:\611929c5.exe

            Filesize

            15KB

            MD5

            e351365b4bc9f244b8424288e2cdbcbd

            SHA1

            f2d70670f8d230a59b453ae4cf4738e7675221a2

            SHA256

            d511d476b6777335ed6d1bc3ce7efdf84a91bf04a6514c263c28caec186e09ee

            SHA512

            263f3db3f4d4d7e4d8cfef8663ab9dbebfa3f6606c1eca0fe0fbcaa867e0980617972d1e15c888fd7c849b4d17e457e877991c55ea82c10e8033662e26520864

          • C:\Users\Admin\AppData\Local\Temp\7d9c52bf.bat

            Filesize

            129B

            MD5

            08fcf318a5ef5b8872f4809ffba0e40c

            SHA1

            7045be640a22adbd58f1652ce195263df9a60ebc

            SHA256

            8b3ad7a98741e9c9682124f8f37c9c280e108b101dcd465bf7b5228a06a4b5cb

            SHA512

            049f5bb44cf12e7a46305d00bd13132e0d1c7f76f8a85e5e1965685b6acc05e38a6c10938488634713a2178c73b7de4445c828f5f51e0f9ec4745085c3756fbc

          • memory/628-56-0x00000000757A1000-0x00000000757A3000-memory.dmp

            Filesize

            8KB

          • memory/628-59-0x0000000001260000-0x0000000001269000-memory.dmp

            Filesize

            36KB

          • memory/628-61-0x0000000001260000-0x0000000001269000-memory.dmp

            Filesize

            36KB

          • memory/960-58-0x0000000000400000-0x0000000000456000-memory.dmp

            Filesize

            344KB