Analysis

  • max time kernel
    152s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 02:50

General

  • Target

    bc7a737daa1c86a9abe55f24c38a01b8a6615015c59ed8f4201b1fa0d151147e.exe

  • Size

    255KB

  • MD5

    f5e2fa0dffc3a1243a722ead483bcd62

  • SHA1

    72fa77ff03d8ceb6eb1f576214cbd4ca88064d62

  • SHA256

    bc7a737daa1c86a9abe55f24c38a01b8a6615015c59ed8f4201b1fa0d151147e

  • SHA512

    a1025f7707e272fa60c4d0374cd56fa68c27e675b17a0b0d1ce0b02a8dee79ea7de38dac6af5a3381cf57a1ba048a876734bba535f39b51a2a7968b5b53db5dc

  • SSDEEP

    6144:WoNd7FGge1j67zCBPx2gkCc7fskdSq39Rj:W+7nMqCXFLuf/Sm

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc7a737daa1c86a9abe55f24c38a01b8a6615015c59ed8f4201b1fa0d151147e.exe
    "C:\Users\Admin\AppData\Local\Temp\bc7a737daa1c86a9abe55f24c38a01b8a6615015c59ed8f4201b1fa0d151147e.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\ProgramData\gdnnoyfx.exe
      "C:\ProgramData\gdnnoyfx.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1128

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\gdnnoyfx.exe

          Filesize

          255KB

          MD5

          f5e2fa0dffc3a1243a722ead483bcd62

          SHA1

          72fa77ff03d8ceb6eb1f576214cbd4ca88064d62

          SHA256

          bc7a737daa1c86a9abe55f24c38a01b8a6615015c59ed8f4201b1fa0d151147e

          SHA512

          a1025f7707e272fa60c4d0374cd56fa68c27e675b17a0b0d1ce0b02a8dee79ea7de38dac6af5a3381cf57a1ba048a876734bba535f39b51a2a7968b5b53db5dc

        • C:\ProgramData\gdnnoyfx.exe

          Filesize

          255KB

          MD5

          f5e2fa0dffc3a1243a722ead483bcd62

          SHA1

          72fa77ff03d8ceb6eb1f576214cbd4ca88064d62

          SHA256

          bc7a737daa1c86a9abe55f24c38a01b8a6615015c59ed8f4201b1fa0d151147e

          SHA512

          a1025f7707e272fa60c4d0374cd56fa68c27e675b17a0b0d1ce0b02a8dee79ea7de38dac6af5a3381cf57a1ba048a876734bba535f39b51a2a7968b5b53db5dc

        • C:\Users\Admin\AppData\Local\Temp\systeminterval.exe

          Filesize

          31KB

          MD5

          ed797d8dc2c92401985d162e42ffa450

          SHA1

          0f02fc517c7facc4baefde4fe9467fb6488ebabe

          SHA256

          b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

          SHA512

          e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

        • \ProgramData\gdnnoyfx.exe

          Filesize

          255KB

          MD5

          f5e2fa0dffc3a1243a722ead483bcd62

          SHA1

          72fa77ff03d8ceb6eb1f576214cbd4ca88064d62

          SHA256

          bc7a737daa1c86a9abe55f24c38a01b8a6615015c59ed8f4201b1fa0d151147e

          SHA512

          a1025f7707e272fa60c4d0374cd56fa68c27e675b17a0b0d1ce0b02a8dee79ea7de38dac6af5a3381cf57a1ba048a876734bba535f39b51a2a7968b5b53db5dc

        • \ProgramData\gdnnoyfx.exe

          Filesize

          255KB

          MD5

          f5e2fa0dffc3a1243a722ead483bcd62

          SHA1

          72fa77ff03d8ceb6eb1f576214cbd4ca88064d62

          SHA256

          bc7a737daa1c86a9abe55f24c38a01b8a6615015c59ed8f4201b1fa0d151147e

          SHA512

          a1025f7707e272fa60c4d0374cd56fa68c27e675b17a0b0d1ce0b02a8dee79ea7de38dac6af5a3381cf57a1ba048a876734bba535f39b51a2a7968b5b53db5dc

        • memory/1128-63-0x0000000074300000-0x00000000748AB000-memory.dmp

          Filesize

          5.7MB

        • memory/1128-65-0x0000000074300000-0x00000000748AB000-memory.dmp

          Filesize

          5.7MB

        • memory/1184-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

          Filesize

          8KB

        • memory/1184-55-0x0000000074300000-0x00000000748AB000-memory.dmp

          Filesize

          5.7MB

        • memory/1184-62-0x0000000074300000-0x00000000748AB000-memory.dmp

          Filesize

          5.7MB