Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-10-2022 20:30

General

  • Target

    261c71f78bb6c164c4bfb65e4621f74ee0723e1ba39cf6281aa2b133f62da5e5.exe

  • Size

    867KB

  • MD5

    cfb7c0539dab1b742392fc2faf2663bd

  • SHA1

    a3022a73527089d9687dd43d1c32b82ef1ce76e0

  • SHA256

    261c71f78bb6c164c4bfb65e4621f74ee0723e1ba39cf6281aa2b133f62da5e5

  • SHA512

    4157d25fb3097595760b1b91a8fbb8290227f314429b2a77e6242df413689f1512bf184796f23b5770b220304c8ac3380ad65a68687b268f13b8fcca770bd756

  • SSDEEP

    12288:SV+mz3b38lrV6avz6jJnoKdN3HBCf4wzuNE36svt0/2CyPiAoia9qHj5mgOqnTCf:S8C386jvdhHBCAzuIBFd9K5fOJmHHHK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 7 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\261c71f78bb6c164c4bfb65e4621f74ee0723e1ba39cf6281aa2b133f62da5e5.exe
    "C:\Users\Admin\AppData\Local\Temp\261c71f78bb6c164c4bfb65e4621f74ee0723e1ba39cf6281aa2b133f62da5e5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Users\Admin\AppData\Local\Temp\ygejql.exe
      "C:\Users\Admin\AppData\Local\Temp\ygejql.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Users\Admin\AppData\Local\Temp\Wywz.exe
        Wywz.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Config.def

    Filesize

    286B

    MD5

    83321f4f5464b1646d1e4a3585f44969

    SHA1

    4177fa9218b62d14a0341d1ae28ab413b509f4b8

    SHA256

    7e482396523ce45e98f4d583f899b41b98890d9e5f6fd54675c891a9fee4b9a2

    SHA512

    7b8e18ba5e0453cd35b90f0f4eedfe478e19008381f708c2b133dd4dab7cc2a716ec0b6dcaa3a8cd95f6852fe66a2671cf703f14bd9f503f42ebb34f0848e045

  • C:\Users\Admin\AppData\Local\Temp\ERASER.dll

    Filesize

    440KB

    MD5

    0f98c73634abac303e6dc32eabcde855

    SHA1

    df0f198098383b052bc3242ce71d4f65647dbd11

    SHA256

    2fcc6a234b243feef02d83c32c63472069c0a5b25aaeb983e250e254408b9a09

    SHA512

    c3eef986cf1e7eab7cb04896d0bc5f89886e557a46c22a0cd79d0769005c422c6ba939a43722b16f7929032fb91f47b764471ed9f32e8b8886215d9aed10f42f

  • C:\Users\Admin\AppData\Local\Temp\Erasext.dll

    Filesize

    220KB

    MD5

    0fe38a0fe46fb49bad510fbbf12dc3ec

    SHA1

    ffca059e6b1b4a15366483c701ffd5109f931378

    SHA256

    a3651f3400486ce730d60ad56aa7eac6d0b2caa85ad1c16a8ad6ac3d02531e11

    SHA512

    86e1db99a7c0e095362f486f81071a8302907d0ea9022607694b2c9c0b1b7fc8ce98550e7b8a0017d409a41a6c6e3c1850ef71ce19b905608826e2970419962b

  • C:\Users\Admin\AppData\Local\Temp\Wywz.exe

    Filesize

    600KB

    MD5

    d60cda173a484ed3861f8b95efe43b6b

    SHA1

    f91daa272390f2d7cefdb4610d296b5c1d7aa99e

    SHA256

    b059e0c1fa26a84ac10a85b80282c37ae18fcd6f5bf3154f41b77cde8174e9fc

    SHA512

    6c8b23de80272d0025c98d83a875e17619d4acf4ab28d07afa42f6289087e300cd1a750cb79d01eaf10429d98aec525634f8120f5ab2cd3632456673da9ee880

  • C:\Users\Admin\AppData\Local\Temp\Wywz.exe

    Filesize

    600KB

    MD5

    d60cda173a484ed3861f8b95efe43b6b

    SHA1

    f91daa272390f2d7cefdb4610d296b5c1d7aa99e

    SHA256

    b059e0c1fa26a84ac10a85b80282c37ae18fcd6f5bf3154f41b77cde8174e9fc

    SHA512

    6c8b23de80272d0025c98d83a875e17619d4acf4ab28d07afa42f6289087e300cd1a750cb79d01eaf10429d98aec525634f8120f5ab2cd3632456673da9ee880

  • C:\Users\Admin\AppData\Local\Temp\ygejql.exe

    Filesize

    414KB

    MD5

    237612cfdadaec8be16d035ec6fd45ef

    SHA1

    eabdcd246f1ee20b16d526a1334dec28d57c5d5c

    SHA256

    b677c14ab77a68396f3c269f09a510865b59121a1f1d8598242de5a894eedd88

    SHA512

    94aeb356365e6727481ab0c9fef0a82d75f15843549bf741f8022580cf28a8ccdc28660bd43fea9cee6508253d250da330f1ae88b495f1ee47a75dd4d23701fb

  • C:\Users\Admin\AppData\Local\Temp\ygejql.exe

    Filesize

    414KB

    MD5

    237612cfdadaec8be16d035ec6fd45ef

    SHA1

    eabdcd246f1ee20b16d526a1334dec28d57c5d5c

    SHA256

    b677c14ab77a68396f3c269f09a510865b59121a1f1d8598242de5a894eedd88

    SHA512

    94aeb356365e6727481ab0c9fef0a82d75f15843549bf741f8022580cf28a8ccdc28660bd43fea9cee6508253d250da330f1ae88b495f1ee47a75dd4d23701fb

  • \Users\Admin\AppData\Local\Temp\Eraser.dll

    Filesize

    440KB

    MD5

    0f98c73634abac303e6dc32eabcde855

    SHA1

    df0f198098383b052bc3242ce71d4f65647dbd11

    SHA256

    2fcc6a234b243feef02d83c32c63472069c0a5b25aaeb983e250e254408b9a09

    SHA512

    c3eef986cf1e7eab7cb04896d0bc5f89886e557a46c22a0cd79d0769005c422c6ba939a43722b16f7929032fb91f47b764471ed9f32e8b8886215d9aed10f42f

  • \Users\Admin\AppData\Local\Temp\Wywz.exe

    Filesize

    600KB

    MD5

    d60cda173a484ed3861f8b95efe43b6b

    SHA1

    f91daa272390f2d7cefdb4610d296b5c1d7aa99e

    SHA256

    b059e0c1fa26a84ac10a85b80282c37ae18fcd6f5bf3154f41b77cde8174e9fc

    SHA512

    6c8b23de80272d0025c98d83a875e17619d4acf4ab28d07afa42f6289087e300cd1a750cb79d01eaf10429d98aec525634f8120f5ab2cd3632456673da9ee880

  • \Users\Admin\AppData\Local\Temp\Wywz.exe

    Filesize

    600KB

    MD5

    d60cda173a484ed3861f8b95efe43b6b

    SHA1

    f91daa272390f2d7cefdb4610d296b5c1d7aa99e

    SHA256

    b059e0c1fa26a84ac10a85b80282c37ae18fcd6f5bf3154f41b77cde8174e9fc

    SHA512

    6c8b23de80272d0025c98d83a875e17619d4acf4ab28d07afa42f6289087e300cd1a750cb79d01eaf10429d98aec525634f8120f5ab2cd3632456673da9ee880

  • \Users\Admin\AppData\Local\Temp\ygejql.exe

    Filesize

    414KB

    MD5

    237612cfdadaec8be16d035ec6fd45ef

    SHA1

    eabdcd246f1ee20b16d526a1334dec28d57c5d5c

    SHA256

    b677c14ab77a68396f3c269f09a510865b59121a1f1d8598242de5a894eedd88

    SHA512

    94aeb356365e6727481ab0c9fef0a82d75f15843549bf741f8022580cf28a8ccdc28660bd43fea9cee6508253d250da330f1ae88b495f1ee47a75dd4d23701fb

  • memory/868-54-0x0000000075131000-0x0000000075133000-memory.dmp

    Filesize

    8KB

  • memory/1756-63-0x0000000000000000-mapping.dmp

  • memory/1900-56-0x0000000000000000-mapping.dmp