Analysis

  • max time kernel
    41s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2022 09:40

General

  • Target

    0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe

  • Size

    2.3MB

  • MD5

    1acd748077b01272fc18ca9a1271c7b0

  • SHA1

    b2c7fce642fd06ec9122021ee43a9ca593914cc3

  • SHA256

    0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af

  • SHA512

    b7396be5df422911ba28b5ee04c3b2b2d691f3dde074a9af897be9041aa1b4798842f862e9420d3734dbb49caab947b91dd4cbaa5a089819d60b35a01ae39a72

  • SSDEEP

    49152:xpymeCZZQYiMg6+vf8YfogWyxSQtrbXFLO6W4mAeEAGnpfBDb:xpyEZQ6c0Imy0UfVLOYm0nR5b

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 24 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe
    "C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\e4UeAAcAuCLUdI2G.exe
      "C:\Users\Admin\AppData\Local\Temp\e4UeAAcAuCLUdI2G.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Users\Admin\AppData\Local\TempCSGO Client.exe
        "C:\Users\Admin\AppData\Local\TempCSGO Client.exe"
        3⤵
        • Executes dropped EXE
        PID:1196
      • C:\Users\Admin\AppData\Local\Temp\e4UeAAcAuCLUdI2G.exe
        "C:\Users\Admin\AppData\Local\Temp\e4UeAAcAuCLUdI2G.exe" /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\892451" "C:\Users\Admin\AppData\Local\Temp\e4UeAAcAuCLUdI2G.exe"
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:388
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\72.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:576
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 0127.0.0.1
            5⤵
            • Runs ping.exe
            PID:1376
    • C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe
      "C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe"
      2⤵
        PID:1312
      • C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe
        "C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe"
        2⤵
          PID:624
        • C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe
          "C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe"
          2⤵
            PID:1324
          • C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe
            "C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe"
            2⤵
              PID:1904
            • C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe
              "C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe"
              2⤵
                PID:1112
              • C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe
                "C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe"
                2⤵
                  PID:1116

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\TempCSGO Client.exe

                Filesize

                151KB

                MD5

                5f05e7130bc6dc523faa9cf537157af1

                SHA1

                c63fe5480dbed5a2b0d40426160d5892a8c9130f

                SHA256

                ab2399f8c2e7ef0eac6ed6697d17471bd170b093ac3aab9a9af4a1b9a4b39efa

                SHA512

                dea6b35d0164046adf661557c68a7fb1a7f643cbc671f216469db8f8c3af5cfceb11e72982910cbcf3a0ddabdfa39d042ef837ef1f5cac3dfd863273650c42ac

              • C:\Users\Admin\AppData\Local\TempCSGO Client.exe

                Filesize

                151KB

                MD5

                5f05e7130bc6dc523faa9cf537157af1

                SHA1

                c63fe5480dbed5a2b0d40426160d5892a8c9130f

                SHA256

                ab2399f8c2e7ef0eac6ed6697d17471bd170b093ac3aab9a9af4a1b9a4b39efa

                SHA512

                dea6b35d0164046adf661557c68a7fb1a7f643cbc671f216469db8f8c3af5cfceb11e72982910cbcf3a0ddabdfa39d042ef837ef1f5cac3dfd863273650c42ac

              • C:\Users\Admin\AppData\Local\Temp\72.bat

                Filesize

                188B

                MD5

                08d6fee4b0f0fd3df863f9b74c44679d

                SHA1

                947c8b3c005864a81cd893e440e23022be5a8e6a

                SHA256

                47047cd6e7375b12b27c858f8a67de7a2ec2c918a1f7110067927e2cda3f8bb1

                SHA512

                9ac421abca61945d7aea7e5220d301490a2bce17c3b5e3f48cd864468399d914eefd30f6d67af08772fbefaaf54c277be9e89c34795b9c5ac5bde5a4a2adf294

              • C:\Users\Admin\AppData\Local\Temp\892451

                Filesize

                18KB

                MD5

                ba7ed704ea46ad6efe082e5ff4e373ee

                SHA1

                f77c50c318e5b65c06ef07b466fbf49fa477fc34

                SHA256

                b6725014e644232a901aa4bf9546fa02a77e163d32c15b6843d0147826d11b30

                SHA512

                b6e94cc31608bda8299285d6f58935ed2ccb817faad96d42a6e35db82fa11a97b6e6457ded75550aea7786f522f743b16028ee6723623e0b83fa94f2423859bb

              • C:\Users\Admin\AppData\Local\Temp\e4UeAAcAuCLUdI2G.exe

                Filesize

                1.6MB

                MD5

                ca31b9b62cd0e6d2c306076283058574

                SHA1

                9fb108cc95deff0ca4f75eac7ec4dfa3c363d927

                SHA256

                21923cda960ce09c6eba5863525154d60eb7f9d80ca4021f61cf6c86dd721b6b

                SHA512

                84363cb72b6025eed6108529dda6847341d89e289f9711f8ff39060c0553d07ee1e0164dabc7c3c2f8d66567059e55f82dcb731c63bed80f457a18dfab04d191

              • C:\Users\Admin\AppData\Local\Temp\e4UeAAcAuCLUdI2G.exe

                Filesize

                1.6MB

                MD5

                ca31b9b62cd0e6d2c306076283058574

                SHA1

                9fb108cc95deff0ca4f75eac7ec4dfa3c363d927

                SHA256

                21923cda960ce09c6eba5863525154d60eb7f9d80ca4021f61cf6c86dd721b6b

                SHA512

                84363cb72b6025eed6108529dda6847341d89e289f9711f8ff39060c0553d07ee1e0164dabc7c3c2f8d66567059e55f82dcb731c63bed80f457a18dfab04d191

              • C:\Users\Admin\AppData\Local\Temp\e4UeAAcAuCLUdI2G.exe

                Filesize

                1.6MB

                MD5

                ca31b9b62cd0e6d2c306076283058574

                SHA1

                9fb108cc95deff0ca4f75eac7ec4dfa3c363d927

                SHA256

                21923cda960ce09c6eba5863525154d60eb7f9d80ca4021f61cf6c86dd721b6b

                SHA512

                84363cb72b6025eed6108529dda6847341d89e289f9711f8ff39060c0553d07ee1e0164dabc7c3c2f8d66567059e55f82dcb731c63bed80f457a18dfab04d191

              • \Users\Admin\AppData\Local\TempCSGO Client.exe

                Filesize

                151KB

                MD5

                5f05e7130bc6dc523faa9cf537157af1

                SHA1

                c63fe5480dbed5a2b0d40426160d5892a8c9130f

                SHA256

                ab2399f8c2e7ef0eac6ed6697d17471bd170b093ac3aab9a9af4a1b9a4b39efa

                SHA512

                dea6b35d0164046adf661557c68a7fb1a7f643cbc671f216469db8f8c3af5cfceb11e72982910cbcf3a0ddabdfa39d042ef837ef1f5cac3dfd863273650c42ac

              • \Users\Admin\AppData\Local\TempCSGO Client.exe

                Filesize

                151KB

                MD5

                5f05e7130bc6dc523faa9cf537157af1

                SHA1

                c63fe5480dbed5a2b0d40426160d5892a8c9130f

                SHA256

                ab2399f8c2e7ef0eac6ed6697d17471bd170b093ac3aab9a9af4a1b9a4b39efa

                SHA512

                dea6b35d0164046adf661557c68a7fb1a7f643cbc671f216469db8f8c3af5cfceb11e72982910cbcf3a0ddabdfa39d042ef837ef1f5cac3dfd863273650c42ac

              • \Users\Admin\AppData\Local\TempCSGO Client.exe

                Filesize

                151KB

                MD5

                5f05e7130bc6dc523faa9cf537157af1

                SHA1

                c63fe5480dbed5a2b0d40426160d5892a8c9130f

                SHA256

                ab2399f8c2e7ef0eac6ed6697d17471bd170b093ac3aab9a9af4a1b9a4b39efa

                SHA512

                dea6b35d0164046adf661557c68a7fb1a7f643cbc671f216469db8f8c3af5cfceb11e72982910cbcf3a0ddabdfa39d042ef837ef1f5cac3dfd863273650c42ac

              • \Users\Admin\AppData\Local\TempCSGO Client.exe

                Filesize

                151KB

                MD5

                5f05e7130bc6dc523faa9cf537157af1

                SHA1

                c63fe5480dbed5a2b0d40426160d5892a8c9130f

                SHA256

                ab2399f8c2e7ef0eac6ed6697d17471bd170b093ac3aab9a9af4a1b9a4b39efa

                SHA512

                dea6b35d0164046adf661557c68a7fb1a7f643cbc671f216469db8f8c3af5cfceb11e72982910cbcf3a0ddabdfa39d042ef837ef1f5cac3dfd863273650c42ac

              • \Users\Admin\AppData\Local\TempCSGO Client.exe

                Filesize

                151KB

                MD5

                5f05e7130bc6dc523faa9cf537157af1

                SHA1

                c63fe5480dbed5a2b0d40426160d5892a8c9130f

                SHA256

                ab2399f8c2e7ef0eac6ed6697d17471bd170b093ac3aab9a9af4a1b9a4b39efa

                SHA512

                dea6b35d0164046adf661557c68a7fb1a7f643cbc671f216469db8f8c3af5cfceb11e72982910cbcf3a0ddabdfa39d042ef837ef1f5cac3dfd863273650c42ac

              • \Users\Admin\AppData\Local\Temp\e4UeAAcAuCLUdI2G.exe

                Filesize

                1.6MB

                MD5

                ca31b9b62cd0e6d2c306076283058574

                SHA1

                9fb108cc95deff0ca4f75eac7ec4dfa3c363d927

                SHA256

                21923cda960ce09c6eba5863525154d60eb7f9d80ca4021f61cf6c86dd721b6b

                SHA512

                84363cb72b6025eed6108529dda6847341d89e289f9711f8ff39060c0553d07ee1e0164dabc7c3c2f8d66567059e55f82dcb731c63bed80f457a18dfab04d191

              • \Users\Admin\AppData\Local\Temp\e4UeAAcAuCLUdI2G.exe

                Filesize

                1.6MB

                MD5

                ca31b9b62cd0e6d2c306076283058574

                SHA1

                9fb108cc95deff0ca4f75eac7ec4dfa3c363d927

                SHA256

                21923cda960ce09c6eba5863525154d60eb7f9d80ca4021f61cf6c86dd721b6b

                SHA512

                84363cb72b6025eed6108529dda6847341d89e289f9711f8ff39060c0553d07ee1e0164dabc7c3c2f8d66567059e55f82dcb731c63bed80f457a18dfab04d191

              • \Users\Admin\AppData\Local\Temp\e4UeAAcAuCLUdI2G.exe

                Filesize

                1.6MB

                MD5

                ca31b9b62cd0e6d2c306076283058574

                SHA1

                9fb108cc95deff0ca4f75eac7ec4dfa3c363d927

                SHA256

                21923cda960ce09c6eba5863525154d60eb7f9d80ca4021f61cf6c86dd721b6b

                SHA512

                84363cb72b6025eed6108529dda6847341d89e289f9711f8ff39060c0553d07ee1e0164dabc7c3c2f8d66567059e55f82dcb731c63bed80f457a18dfab04d191

              • memory/388-78-0x0000000074201000-0x0000000074203000-memory.dmp

                Filesize

                8KB

              • memory/1196-70-0x000007FEF33F0000-0x000007FEF3E13000-memory.dmp

                Filesize

                10.1MB

              • memory/1196-77-0x000007FEF2350000-0x000007FEF33E6000-memory.dmp

                Filesize

                16.6MB

              • memory/1196-79-0x0000000000BD6000-0x0000000000BF5000-memory.dmp

                Filesize

                124KB

              • memory/1736-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

                Filesize

                8KB

              • memory/1736-61-0x0000000074290000-0x000000007483B000-memory.dmp

                Filesize

                5.7MB

              • memory/1736-55-0x0000000074290000-0x000000007483B000-memory.dmp

                Filesize

                5.7MB