Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-10-2022 21:41

General

  • Target

    5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe

  • Size

    421KB

  • MD5

    1fe104c0c6b8e2ff1e6af09d71b2e44e

  • SHA1

    913ac9d7c8acf8dc427581605091440bb7f19d98

  • SHA256

    5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d

  • SHA512

    61d7fc066f9f6d2c919891ffba676b960d9c9be23dfbfabc3837eae89dc9b7bc211727cedd22d336f9b5d163a806b9fdbb653ce4cb51c90af800d8396e35beae

  • SSDEEP

    12288:DjODTivE9Gzlr3yPRpb+Wvo3/nZFozAKR4p3:DjOysIhr3ORpbBofZFv7p3

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe
    "C:\Users\Admin\AppData\Local\Temp\5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\7zSF087.tmp\AutoInst.exe
      "C:\Users\Admin\AppData\Local\Temp\7zSF087.tmp\AutoInst.exe"
      2⤵
      • Executes dropped EXE
      PID:1320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSF087.tmp\AutoInst.exe

    Filesize

    805KB

    MD5

    6709897005120aec5674859cc20b1db3

    SHA1

    d6060f0989d6aea4b51f7dde439ca5a21fbc6639

    SHA256

    ebddf94172297bcf26fb6142f599de1facb43ab81e8fdf0d83fa79ad2f7ff5c8

    SHA512

    a753ff5121b2c64d473542bee51a90bb953e65879c9cd44812b4b0fd921aa7e19012341b05ccf6fd58c05c3f34715b671c6924526c165ba2aaf3804eb0b421b5

  • C:\Users\Admin\AppData\Local\Temp\7zSF087.tmp\AutoInst.ini

    Filesize

    165B

    MD5

    e935d8e5d049a4bc817a754ecac200bd

    SHA1

    aa87ca72a14d826dd0ed5563ba1084fc0b407a50

    SHA256

    8fdb740d34fe42516d9be70fb37969a5d1ebe994c9180c3d76aecf04b96bdb4d

    SHA512

    72dd99d4410955fa47df32f635a2ce379d3d5a8865ae1f60b12787cb904f1881e79bd129a8d05e5d5d3f271592c7b7b8e512ae3e0977197497a343ca4de89984

  • \Users\Admin\AppData\Local\Temp\7zSF087.tmp\AutoInst.exe

    Filesize

    805KB

    MD5

    6709897005120aec5674859cc20b1db3

    SHA1

    d6060f0989d6aea4b51f7dde439ca5a21fbc6639

    SHA256

    ebddf94172297bcf26fb6142f599de1facb43ab81e8fdf0d83fa79ad2f7ff5c8

    SHA512

    a753ff5121b2c64d473542bee51a90bb953e65879c9cd44812b4b0fd921aa7e19012341b05ccf6fd58c05c3f34715b671c6924526c165ba2aaf3804eb0b421b5

  • \Users\Admin\AppData\Local\Temp\7zSF087.tmp\AutoInst.exe

    Filesize

    805KB

    MD5

    6709897005120aec5674859cc20b1db3

    SHA1

    d6060f0989d6aea4b51f7dde439ca5a21fbc6639

    SHA256

    ebddf94172297bcf26fb6142f599de1facb43ab81e8fdf0d83fa79ad2f7ff5c8

    SHA512

    a753ff5121b2c64d473542bee51a90bb953e65879c9cd44812b4b0fd921aa7e19012341b05ccf6fd58c05c3f34715b671c6924526c165ba2aaf3804eb0b421b5

  • \Users\Admin\AppData\Local\Temp\7zSF087.tmp\AutoInst.exe

    Filesize

    805KB

    MD5

    6709897005120aec5674859cc20b1db3

    SHA1

    d6060f0989d6aea4b51f7dde439ca5a21fbc6639

    SHA256

    ebddf94172297bcf26fb6142f599de1facb43ab81e8fdf0d83fa79ad2f7ff5c8

    SHA512

    a753ff5121b2c64d473542bee51a90bb953e65879c9cd44812b4b0fd921aa7e19012341b05ccf6fd58c05c3f34715b671c6924526c165ba2aaf3804eb0b421b5

  • \Users\Admin\AppData\Local\Temp\7zSF087.tmp\AutoInst.exe

    Filesize

    805KB

    MD5

    6709897005120aec5674859cc20b1db3

    SHA1

    d6060f0989d6aea4b51f7dde439ca5a21fbc6639

    SHA256

    ebddf94172297bcf26fb6142f599de1facb43ab81e8fdf0d83fa79ad2f7ff5c8

    SHA512

    a753ff5121b2c64d473542bee51a90bb953e65879c9cd44812b4b0fd921aa7e19012341b05ccf6fd58c05c3f34715b671c6924526c165ba2aaf3804eb0b421b5

  • memory/1960-54-0x00000000751A1000-0x00000000751A3000-memory.dmp

    Filesize

    8KB