Analysis

  • max time kernel
    137s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 18:40

General

  • Target

    41a29ff7eeb9609bbca8261dc51b6467750c93032ee449ccd00c3cfdc4e702a5.exe

  • Size

    984KB

  • MD5

    8433a22411da24387177f21242c3adba

  • SHA1

    bd71f62e35962e131ce354ee7456666deb0ed861

  • SHA256

    41a29ff7eeb9609bbca8261dc51b6467750c93032ee449ccd00c3cfdc4e702a5

  • SHA512

    ea0bb8f4e7ae9642561d4c0a5388519d9ce3664d70d1b73ad3cb43a8f028c015d4da0523b2be359afe2667bd66d0c5d04aca9186c9d5bcff0b55eb9b7ef20aaa

  • SSDEEP

    12288:YgdLZ77GT7GmYRpuEcutuFY1hGoksq6iTZaAZaWZSZvd9ZEAPRzaO2J5KLY9QRsN:YgLGTpo9qlBAP66ZDGUKI

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 3 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41a29ff7eeb9609bbca8261dc51b6467750c93032ee449ccd00c3cfdc4e702a5.exe
    "C:\Users\Admin\AppData\Local\Temp\41a29ff7eeb9609bbca8261dc51b6467750c93032ee449ccd00c3cfdc4e702a5.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Users\Admin\Wins7\msmm.exe
      C:\Users\Admin\Wins7\msmm.exe /p
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Enumerates connected drives
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Wins7\msmm.exe

    Filesize

    984KB

    MD5

    e6a9a8bed0d4d3d59420acf86cce85fb

    SHA1

    c4b598436f8715c73d4c7f5e79ad85df82928dec

    SHA256

    9c402c20fe141c6ce6fec41680efbc39758e4aa4b58198e23922b170f1fcd608

    SHA512

    e6bcc96c09c9632b29681786c3fe9fb7353237d218b131bb33762654da43b266172cae6d7affe5d35e5424e42f3ce7b4cf5319f4d2c768cfaf37abd5f542795f

  • C:\Users\Admin\Wins7\msmm.exe

    Filesize

    984KB

    MD5

    e6a9a8bed0d4d3d59420acf86cce85fb

    SHA1

    c4b598436f8715c73d4c7f5e79ad85df82928dec

    SHA256

    9c402c20fe141c6ce6fec41680efbc39758e4aa4b58198e23922b170f1fcd608

    SHA512

    e6bcc96c09c9632b29681786c3fe9fb7353237d218b131bb33762654da43b266172cae6d7affe5d35e5424e42f3ce7b4cf5319f4d2c768cfaf37abd5f542795f

  • \Users\Admin\Wins7\msmm.exe

    Filesize

    984KB

    MD5

    e6a9a8bed0d4d3d59420acf86cce85fb

    SHA1

    c4b598436f8715c73d4c7f5e79ad85df82928dec

    SHA256

    9c402c20fe141c6ce6fec41680efbc39758e4aa4b58198e23922b170f1fcd608

    SHA512

    e6bcc96c09c9632b29681786c3fe9fb7353237d218b131bb33762654da43b266172cae6d7affe5d35e5424e42f3ce7b4cf5319f4d2c768cfaf37abd5f542795f

  • \Users\Admin\Wins7\msmm.exe

    Filesize

    984KB

    MD5

    e6a9a8bed0d4d3d59420acf86cce85fb

    SHA1

    c4b598436f8715c73d4c7f5e79ad85df82928dec

    SHA256

    9c402c20fe141c6ce6fec41680efbc39758e4aa4b58198e23922b170f1fcd608

    SHA512

    e6bcc96c09c9632b29681786c3fe9fb7353237d218b131bb33762654da43b266172cae6d7affe5d35e5424e42f3ce7b4cf5319f4d2c768cfaf37abd5f542795f

  • \Users\Admin\Wins7\msmm.exe

    Filesize

    984KB

    MD5

    e6a9a8bed0d4d3d59420acf86cce85fb

    SHA1

    c4b598436f8715c73d4c7f5e79ad85df82928dec

    SHA256

    9c402c20fe141c6ce6fec41680efbc39758e4aa4b58198e23922b170f1fcd608

    SHA512

    e6bcc96c09c9632b29681786c3fe9fb7353237d218b131bb33762654da43b266172cae6d7affe5d35e5424e42f3ce7b4cf5319f4d2c768cfaf37abd5f542795f

  • memory/1112-57-0x0000000075B11000-0x0000000075B13000-memory.dmp

    Filesize

    8KB

  • memory/1112-56-0x0000000000400000-0x00000000004FB000-memory.dmp

    Filesize

    1004KB

  • memory/1112-67-0x0000000000400000-0x00000000004FB000-memory.dmp

    Filesize

    1004KB

  • memory/1784-68-0x0000000000400000-0x00000000004FB000-memory.dmp

    Filesize

    1004KB