Analysis

  • max time kernel
    46s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 03:18

General

  • Target

    5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe

  • Size

    144KB

  • MD5

    5edc21aaa81001e429de1ebad7b72d70

  • SHA1

    75fbeb75de9e118ea04884ee88270ea8b238e40c

  • SHA256

    5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2

  • SHA512

    0c554942fd89e8f2a160fc6cbec75d961de8f62b9deec9d0a05c94bc2113c3772cffb5371d361427b01c60463ad77a9fc5f6738417968652356428c0593e1e4e

  • SSDEEP

    3072:bEX9m+KA5vNnmOt3wfFmICh7EvnXZBKFZAAUnjlfZ+gltv8+zV+khcGCH:bQXNmOt3w9C+vXbCCAsjtBv8yV+khh

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe
    "C:\Users\Admin\AppData\Local\Temp\5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\TdURMX.exe
      C:\Users\Admin\AppData\Local\Temp\TdURMX.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\7b1a184f.bat" "
        3⤵
          PID:1664

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7b1a184f.bat

      Filesize

      187B

      MD5

      65db8f19202f6dce383ef388866d2dd3

      SHA1

      8e0827c2ce45feda0782e292e8f9c24ea0e32bc0

      SHA256

      60d6ec66a11fa9c7ff89d4d855c39cc249eb042c16a9847b4f8756a5cb2e361f

      SHA512

      6612cc42fe91003ea30ee47d30b1fec6767c1a807ea25a0ed196d75af44796fbf3a274cb9667fe6e311bd0f82e938861b0e9dee8da4526c1dafc2fd25d758a7d

    • C:\Users\Admin\AppData\Local\Temp\TdURMX.exe

      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • C:\Users\Admin\AppData\Local\Temp\TdURMX.exe

      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • \Users\Admin\AppData\Local\Temp\TdURMX.exe

      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • \Users\Admin\AppData\Local\Temp\TdURMX.exe

      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • memory/1444-64-0x0000000000220000-0x0000000000229000-memory.dmp

      Filesize

      36KB

    • memory/1444-65-0x0000000000220000-0x0000000000229000-memory.dmp

      Filesize

      36KB

    • memory/1444-63-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1444-67-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1948-58-0x0000000075D71000-0x0000000075D73000-memory.dmp

      Filesize

      8KB

    • memory/1948-66-0x00000000001E0000-0x00000000001E9000-memory.dmp

      Filesize

      36KB

    • memory/1948-69-0x00000000001E0000-0x00000000001E9000-memory.dmp

      Filesize

      36KB