Analysis

  • max time kernel
    59s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2022 15:50

General

  • Target

    Browser_renew.exe

  • Size

    35.1MB

  • MD5

    edde1633579f5e1f0543140cfbfa50fb

  • SHA1

    4233ff7941da62b86fc2c2d92be0572c9ab534c8

  • SHA256

    23b14288d49610a8eef61977b7fc49a963f1261fe29b1668b4443a04eaf493cb

  • SHA512

    e03a1575824ea04d30e3c3290d87e73be689014970e94ddc56f157766bc048faa5129e4589be0b8a404ce75c0fdf4301973c21cb5593a9c6006f26709507bf5c

  • SSDEEP

    786432:SQRwdPcRZMRDY8X9XRTuCpZD7U4qRVOtIqNi0f9jphU7oDM8ETp9an3aZO:1RwdPcRZuDYg1pZfUNRctpNi0f9dhU7a

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 10 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Browser_renew.exe
    "C:\Users\Admin\AppData\Local\Temp\Browser_renew.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\BRL000007f0\BR100F.tmp

    Filesize

    14KB

    MD5

    d74aadd701bfacc474c431acab7b9265

    SHA1

    8a2b424d1f949430ddc1faddee3e9ccb79c95de2

    SHA256

    f1029f5cca3dabfeffe2c9db6ad84a9ff0f64f5b2fb85cb6ab348740f756e07d

    SHA512

    0ef85e311fb4843997fd5f87f0a2eec9715e26eae76bfb7bb701d8c043720aeaf7f4825d25187bf35e0a9f00def15ed071120128805445f1330c07c3e0ea5ced

  • \Users\Admin\AppData\Local\Temp\BRL000007f0\BR1177.tmp

    Filesize

    74KB

    MD5

    924b90c3d9e645dfad53f61ea4e91942

    SHA1

    65d397199ff191e5078095036e49f08376f9ae4e

    SHA256

    41788435f245133ec5511111e2c5d52f7515e359876180067e0b5ba85c729322

    SHA512

    76833708828c8f3fad941abeea158317aff98cf0691b5d5dfa4bca15279cdad1cc23a771258e4de41cf12a58f7033a3ee08b0b5eb834d22be568ea98b183ccd9

  • \Users\Admin\AppData\Local\Temp\BRL000007f0\BR1262.tmp

    Filesize

    150KB

    MD5

    efd81ea220094b0e91630b648d00e731

    SHA1

    226635424baf8146af055908c4c12b0a3faecd4f

    SHA256

    931c52c91ffbe12d820ff96570ba8db8abc36ac2fb852c87f2ef99271d7183fa

    SHA512

    fca9ffbcf94507cda23b5a68c4a598a25f0a0e22a7d429a125acbf95bdd03fd63ac80cf8738ae22d1730a73edb3325edc5b85af8d3337a62a97ac0f63dbccdbe

  • \Users\Admin\AppData\Local\Temp\BRL000007f0\BRCFC.tmp

    Filesize

    99KB

    MD5

    2c9676a3167739f36912818acb8e9860

    SHA1

    cd9e5e56cc408c40c45caf49614c26fc7fde39f6

    SHA256

    75fc64a55afa86173947948d78ba5de98dfc35c487166a6682fe71ed5f6f877a

    SHA512

    a6c375511d9d339b889adcca4a95bc23df9e207f86605f6d6d04ab7e211901cdc3012860ed844a5c36737369e01dc70b212f5960d8a662fdc720ad98e1202aa1

  • \Users\Admin\AppData\Local\Temp\BRL000007f0\BRD6B.tmp

    Filesize

    288KB

    MD5

    122a3741699fb5c0950273245c9dea15

    SHA1

    811f9149e3310a8e6521da156f92f3aaab012145

    SHA256

    f675eba3b22e0a2238ec4961d99de3bacca0ab553ab26eecb49800a12a9371ab

    SHA512

    567c480f70fdc78769ae45bf83b6632f7ab380ebeb00689028d39ff03840c8b778149a3fafe1dab2ac77a1fd17a23b09f58774b1c5e791bfd33b99528225eccc

  • \Users\Admin\AppData\Local\Temp\BRL000007f0\BRE27.tmp

    Filesize

    35KB

    MD5

    08ad4cd2a940379f1dcdbdb9884a1375

    SHA1

    c302b7589ba4f05c6429e7f89ad0cb84dd9dfbac

    SHA256

    78827e2b1ef0aad4f8b1b42d0964064819aa22bfcd537ebaacb30d817edc06d8

    SHA512

    f37bd071994c31b361090a149999e8b2d4a7839f19ea63e1d4563aada1371be37f2bfcc474e24de95ff77ca4124a39580c9f711e2fbe54265713ab76f631835a

  • \Users\Admin\AppData\Local\Temp\BRL000007f0\BRE66.tmp

    Filesize

    169KB

    MD5

    cf2d7b4de923b25955d96d2e65ce76bc

    SHA1

    8feee81fe77a7649b969d375778d2b78d842cf48

    SHA256

    0912c84ded4670c427db1f405eb68a5763eae8fa0a735abe44eea81be7dc44ea

    SHA512

    d26a0983f0323655eddc48863a409d172a4623bd7ed465b5a4675477938de10127323040da77c80201c3a816315d98cace5194207e22b0a6ac2e65ae6795dc4f

  • \Users\Admin\AppData\Local\Temp\BRL000007f0\BRE96.tmp

    Filesize

    532KB

    MD5

    a6f7a08b0676f0564a51b5c47973e635

    SHA1

    d56f5f9e2580b81717317da6582da9d379426d5b

    SHA256

    5dd27e845af9333ad7b907a37ab3d239b75be6ccc1f51ef4b21e59b037ce778c

    SHA512

    1101813034db327af1c16d069a4dfa91ab97ee8188f9ed1a6da9d25558866e7e9af59102e58127e64441d3e4a768b2ad788fd0e5a16db994a14637bfbade2954

  • \Users\Admin\AppData\Local\Temp\BRL000007f0\BREF5.tmp

    Filesize

    72KB

    MD5

    c04970b55bcf614f24ca75b1de641ae2

    SHA1

    52b182caef513ed1c36f28eb45cedb257fa8ce40

    SHA256

    5ddee4aab3cf33e505f52199d64809125b26de04fb9970ca589cd8619c859d80

    SHA512

    a5f2660e336bf74a1936fb2e1c724220d862632907f5fd690b365009ac3e1bf35fa6689071f3da4049e495f340ff83f8438b79079ef1f248b9dcaedbdd5d3e40

  • \Users\Admin\AppData\Local\Temp\BRL000007f0\BRF34.tmp

    Filesize

    14KB

    MD5

    77fe66d74901495f4b41a5918acd02ff

    SHA1

    ce5bbd53152cd5b03df8bcc232a1aea36a012764

    SHA256

    b017168c69ef40115141813e47122391602e1af28af342c56495b09f1c3c7522

    SHA512

    cc6e323d0076577a0a04dbe2c33d90dc616cb5ec3637d3df67cbf169766ca2e6de567fcff4f32938fd6118d98e4796642a3010b7264f0ae247fa8f0fe079bd70

  • memory/2032-54-0x0000000076261000-0x0000000076263000-memory.dmp

    Filesize

    8KB