Analysis

  • max time kernel
    36s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2022 02:47

General

  • Target

    6fd5111a229f31d12c0b29695a827c8d5e210ded263b15650fc371616f12c46b.exe

  • Size

    149KB

  • MD5

    41f8d8df05c0f1faed107428c6ab990b

  • SHA1

    814046581700127f1404cc0dfb19140510e74a76

  • SHA256

    6fd5111a229f31d12c0b29695a827c8d5e210ded263b15650fc371616f12c46b

  • SHA512

    0b2fe65354f2d8bd6e89d96ca9826f56a0d6741603559097c11d7c8a8cd6f822fda82d4010ab128f80f5b2d84f0d2dca09d7de058851cec3f59ea55c8a805735

  • SSDEEP

    3072:0H21OD+wHZmJOsuQbFn8PBE6RHkwinFYvpCiP732E91G/MB0N5f1YUWnr:qHjwu28PBxREwinF0oYl+HLkr

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: LoadsDriver 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fd5111a229f31d12c0b29695a827c8d5e210ded263b15650fc371616f12c46b.exe
    "C:\Users\Admin\AppData\Local\Temp\6fd5111a229f31d12c0b29695a827c8d5e210ded263b15650fc371616f12c46b.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    PID:1344

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\dosss11.dll

    Filesize

    72KB

    MD5

    f33feac41b83c279f7efa5381aa6837d

    SHA1

    154de1571818f1ed0c3ca1b5aef1d0433d26caf1

    SHA256

    796c4e0dff25e86b1c028c1b48973960e9db8cd86dfc4dc2046dd207ad56c863

    SHA512

    12af2e6ebe7be6b9337e9e0dcb09b0b6abe52a9769e0ae8213cbe43359e6842bf6181ec0a0064e13d01dc47dc42c83e444120320223542d5477039c57f58a404

  • \Users\Admin\AppData\Local\Temp\nst7B3A.tmp\System.dll

    Filesize

    10KB

    MD5

    bf01b2d04e8fad306ba2f364cfc4edfa

    SHA1

    58f42b45ca9fc1818c4498ecd8bac088d20f2b18

    SHA256

    d3f9c99e0c1c9acd81a1b33bc3dbd305140def90d10485c253cf1d455f0dc903

    SHA512

    30ca1663d659c5efac7fed3d1aaba81c47d5d5fda77f30f021124c882b858732e17f917bfd0aa3ee7b269fad86e75b1b9388d8f916e7a4e2c9961669f2c772e7

  • \Users\Admin\AppData\Local\Temp\nst7B3A.tmp\System.dll

    Filesize

    10KB

    MD5

    bf01b2d04e8fad306ba2f364cfc4edfa

    SHA1

    58f42b45ca9fc1818c4498ecd8bac088d20f2b18

    SHA256

    d3f9c99e0c1c9acd81a1b33bc3dbd305140def90d10485c253cf1d455f0dc903

    SHA512

    30ca1663d659c5efac7fed3d1aaba81c47d5d5fda77f30f021124c882b858732e17f917bfd0aa3ee7b269fad86e75b1b9388d8f916e7a4e2c9961669f2c772e7

  • memory/1344-54-0x0000000074F41000-0x0000000074F43000-memory.dmp

    Filesize

    8KB

  • memory/1344-58-0x0000000000810000-0x0000000000824000-memory.dmp

    Filesize

    80KB