Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 16:56

General

  • Target

    f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe

  • Size

    150KB

  • MD5

    5e00ac27ea934b3c57103ad9830335d0

  • SHA1

    312f001fb9d6a0fca61c1f4320354cad47d9fc9f

  • SHA256

    f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456

  • SHA512

    621b7ed86c96a60185401ba8d551e8b9864e421ec0dbb31103a7553d70fb29e8fe70c764899f0c391874375d2be5903774f959418f63fd4b5532744df8dafc87

  • SSDEEP

    3072:Tecu88h/2y1outqzAoU+WuKurV9GqZghAs10jLAH:Tech8oy1oSqvU+WlY8p0jLAH

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe
    "C:\Users\Admin\AppData\Local\Temp\f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:612
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\F9DFA9~1.EXE > nul
      2⤵
        PID:2560
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k WindowsDriver
      1⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe c:\windows\system32\windowsdriver.dll, ServiceMain
        2⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Drops file in System32 directory
        PID:4316

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\WindowsDriver.dll

      Filesize

      75.1MB

      MD5

      9895e0d727caf8349fd2c835cec35580

      SHA1

      eae5b04e7b0cdfa539122bffa7a2b41a79a48b46

      SHA256

      f38cb399bc6d58c0781490089f5f24d42c037d196e8411531d6d00cf5a816d90

      SHA512

      cc86fb4b7961e4883410d9c1e9e332831c0cbc77e3fdd74abe5da10948a64c3fc1833dca113e0ec5d1b2ac56c6eba7bae456c1724d08d9cb43bf9723ae471abf

    • C:\Windows\SysWOW64\WindowsDriver.dll

      Filesize

      75.1MB

      MD5

      9895e0d727caf8349fd2c835cec35580

      SHA1

      eae5b04e7b0cdfa539122bffa7a2b41a79a48b46

      SHA256

      f38cb399bc6d58c0781490089f5f24d42c037d196e8411531d6d00cf5a816d90

      SHA512

      cc86fb4b7961e4883410d9c1e9e332831c0cbc77e3fdd74abe5da10948a64c3fc1833dca113e0ec5d1b2ac56c6eba7bae456c1724d08d9cb43bf9723ae471abf

    • \??\c:\windows\SysWOW64\windowsdriver.dll

      Filesize

      75.1MB

      MD5

      9895e0d727caf8349fd2c835cec35580

      SHA1

      eae5b04e7b0cdfa539122bffa7a2b41a79a48b46

      SHA256

      f38cb399bc6d58c0781490089f5f24d42c037d196e8411531d6d00cf5a816d90

      SHA512

      cc86fb4b7961e4883410d9c1e9e332831c0cbc77e3fdd74abe5da10948a64c3fc1833dca113e0ec5d1b2ac56c6eba7bae456c1724d08d9cb43bf9723ae471abf

    • memory/612-132-0x0000000000900000-0x000000000094E000-memory.dmp

      Filesize

      312KB

    • memory/612-135-0x0000000000900000-0x000000000094E000-memory.dmp

      Filesize

      312KB

    • memory/2744-137-0x0000000010000000-0x0000000010025000-memory.dmp

      Filesize

      148KB

    • memory/2744-140-0x0000000010000000-0x0000000010025000-memory.dmp

      Filesize

      148KB

    • memory/4316-141-0x0000000010000000-0x0000000010025000-memory.dmp

      Filesize

      148KB