Analysis

  • max time kernel
    176s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2022, 00:23

General

  • Target

    19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe

  • Size

    234KB

  • MD5

    4457eb48a059f7b928368c3a3cee32e1

  • SHA1

    4818775ac7b3ef86cb83398a93fd26aed4e446f7

  • SHA256

    19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b

  • SHA512

    90758af84cea4a0e43555eebb66786f7796a6282f7a7baa466bf1512adb478ccfd4c6f1c50b3c7bb70fc0e621ad70caf2e93323dd1fec13de0df7ccd76cf49e9

  • SSDEEP

    1536:aIqueF0GQ4DlMIR8PjIwh0dszwh0dsbwh0dsl:YBDCXPjl+2l

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe
    "C:\Users\Admin\AppData\Local\Temp\19741aab803d670ecb66e0e8406ae6a74d42fa0b809042be1577ea464d45c85b.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\SysWOW64\reg.exe
        reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f
        3⤵
        • Adds Run key to start application
        PID:956
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\SysWOW64\reg.exe
        reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f
        3⤵
        • Adds Run key to start application
        PID:868
    • C:\windows\temp\31224.exe
      "C:\windows\temp\31224.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1360

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Temp\31224.exe

          Filesize

          24KB

          MD5

          4d3d7de2365df210da13a5b2a524817d

          SHA1

          85ce60c4604e92e9a87891dc3cf1530a9056f505

          SHA256

          a4bd4c37b948c965242a2e053fc4fc05ffee26f54a56199f39d551eee118b19e

          SHA512

          d9b2f7bfeb85983e1092773e5d06bf035bdaf3296ec930e86f6d4c2365a9f3c6ef06462c0e99f113a9f3b2f3e6b8a66bf0f2573374c3965fc335ff29d7ea498a

        • \Windows\Temp\31224.exe

          Filesize

          24KB

          MD5

          4d3d7de2365df210da13a5b2a524817d

          SHA1

          85ce60c4604e92e9a87891dc3cf1530a9056f505

          SHA256

          a4bd4c37b948c965242a2e053fc4fc05ffee26f54a56199f39d551eee118b19e

          SHA512

          d9b2f7bfeb85983e1092773e5d06bf035bdaf3296ec930e86f6d4c2365a9f3c6ef06462c0e99f113a9f3b2f3e6b8a66bf0f2573374c3965fc335ff29d7ea498a

        • \Windows\Temp\31224.exe

          Filesize

          24KB

          MD5

          4d3d7de2365df210da13a5b2a524817d

          SHA1

          85ce60c4604e92e9a87891dc3cf1530a9056f505

          SHA256

          a4bd4c37b948c965242a2e053fc4fc05ffee26f54a56199f39d551eee118b19e

          SHA512

          d9b2f7bfeb85983e1092773e5d06bf035bdaf3296ec930e86f6d4c2365a9f3c6ef06462c0e99f113a9f3b2f3e6b8a66bf0f2573374c3965fc335ff29d7ea498a

        • memory/1748-54-0x0000000076321000-0x0000000076323000-memory.dmp

          Filesize

          8KB