Analysis

  • max time kernel
    173s
  • max time network
    238s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    22-10-2022 06:35

General

  • Target

    54e5e90fbafdf6f051f2c89da50a4b95.exe

  • Size

    192KB

  • MD5

    54e5e90fbafdf6f051f2c89da50a4b95

  • SHA1

    f1e4459301f216cd4ff0bd27deb9d5a910ef9f5b

  • SHA256

    e4d62d22644bd8f7b85b47328cbac771dd76473902ac2a92cb3bb06ff7ed091a

  • SHA512

    a22ccbff0ff8da17a8a3a04f38f644b041b47e1c995b8b40b9a7ec4577c850439d244b966834f86d7ce6dd4ec3369ac11d9950429a3336b9b9c53095ea9b0b4b

  • SSDEEP

    1536:bB+R6Ywvj1k3w45lEdhKzoUSFeuiS2FIlKbz0PEziNQKjoa:tAwvj1Mw4shKzoUSFeuiS2FIIcwKoa

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54e5e90fbafdf6f051f2c89da50a4b95.exe
    "C:\Users\Admin\AppData\Local\Temp\54e5e90fbafdf6f051f2c89da50a4b95.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1664
    • C:\Users\Admin\AppData\Local\Temp\54e5e90fbafdf6f051f2c89da50a4b95.exe
      C:\Users\Admin\AppData\Local\Temp\54e5e90fbafdf6f051f2c89da50a4b95.exe
      2⤵
        PID:1356
      • C:\Users\Admin\AppData\Local\Temp\54e5e90fbafdf6f051f2c89da50a4b95.exe
        C:\Users\Admin\AppData\Local\Temp\54e5e90fbafdf6f051f2c89da50a4b95.exe
        2⤵
          PID:1544
        • C:\Users\Admin\AppData\Local\Temp\54e5e90fbafdf6f051f2c89da50a4b95.exe
          C:\Users\Admin\AppData\Local\Temp\54e5e90fbafdf6f051f2c89da50a4b95.exe
          2⤵
            PID:520
          • C:\Users\Admin\AppData\Local\Temp\54e5e90fbafdf6f051f2c89da50a4b95.exe
            C:\Users\Admin\AppData\Local\Temp\54e5e90fbafdf6f051f2c89da50a4b95.exe
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:772
            • C:\Users\Admin\AppData\Local\Temp\54e5e90fbafdf6f051f2c89da50a4b95.exe
              "C:\Users\Admin\AppData\Local\Temp\54e5e90fbafdf6f051f2c89da50a4b95.exe"
              3⤵
                PID:1112

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          Modify Registry

          1
          T1112

          Discovery

          System Information Discovery

          1
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/772-71-0x0000000000400000-0x000000000043F000-memory.dmp
            Filesize

            252KB

          • memory/772-87-0x0000000000400000-0x000000000043F000-memory.dmp
            Filesize

            252KB

          • memory/772-78-0x0000000000400000-0x000000000043F000-memory.dmp
            Filesize

            252KB

          • memory/772-77-0x0000000000400000-0x000000000043F000-memory.dmp
            Filesize

            252KB

          • memory/772-74-0x000000000040AE9E-mapping.dmp
          • memory/772-73-0x0000000000400000-0x000000000043F000-memory.dmp
            Filesize

            252KB

          • memory/772-66-0x0000000000400000-0x000000000043F000-memory.dmp
            Filesize

            252KB

          • memory/772-69-0x0000000000400000-0x000000000043F000-memory.dmp
            Filesize

            252KB

          • memory/772-63-0x0000000000400000-0x000000000043F000-memory.dmp
            Filesize

            252KB

          • memory/772-64-0x0000000000400000-0x000000000043F000-memory.dmp
            Filesize

            252KB

          • memory/772-68-0x0000000000400000-0x000000000043F000-memory.dmp
            Filesize

            252KB

          • memory/772-70-0x0000000000400000-0x000000000043F000-memory.dmp
            Filesize

            252KB

          • memory/1112-82-0x0000000000400000-0x00000000005F6000-memory.dmp
            Filesize

            2.0MB

          • memory/1112-83-0x0000000000400000-0x00000000005F6000-memory.dmp
            Filesize

            2.0MB

          • memory/1112-92-0x0000000005065000-0x0000000005076000-memory.dmp
            Filesize

            68KB

          • memory/1112-90-0x0000000000400000-0x00000000005F6000-memory.dmp
            Filesize

            2.0MB

          • memory/1112-88-0x0000000000400000-0x00000000005F6000-memory.dmp
            Filesize

            2.0MB

          • memory/1112-85-0x00000000005F192E-mapping.dmp
          • memory/1112-84-0x0000000000400000-0x00000000005F6000-memory.dmp
            Filesize

            2.0MB

          • memory/1112-79-0x0000000000400000-0x00000000005F6000-memory.dmp
            Filesize

            2.0MB

          • memory/1112-80-0x0000000000400000-0x00000000005F6000-memory.dmp
            Filesize

            2.0MB

          • memory/1628-54-0x0000000000380000-0x00000000003B6000-memory.dmp
            Filesize

            216KB

          • memory/1628-56-0x00000000003C0000-0x0000000000458000-memory.dmp
            Filesize

            608KB

          • memory/1628-57-0x00000000052F0000-0x0000000005382000-memory.dmp
            Filesize

            584KB

          • memory/1628-55-0x0000000074F01000-0x0000000074F03000-memory.dmp
            Filesize

            8KB

          • memory/1664-62-0x000000006F040000-0x000000006F5EB000-memory.dmp
            Filesize

            5.7MB

          • memory/1664-58-0x0000000000000000-mapping.dmp
          • memory/1664-60-0x000000006F040000-0x000000006F5EB000-memory.dmp
            Filesize

            5.7MB

          • memory/1664-61-0x000000006F040000-0x000000006F5EB000-memory.dmp
            Filesize

            5.7MB