Analysis

  • max time kernel
    151s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2022 19:58

General

  • Target

    ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe

  • Size

    392KB

  • MD5

    84d3c777e7a9d59f654bae245fd0c0b0

  • SHA1

    c4278de865932e4c2587f56492fa6e752b98e45f

  • SHA256

    ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7

  • SHA512

    8999bc1c23ecea81c6e28c35d7182ce868e8066df08e474d344a67a3741bfa983bd64e8814e5074bff2ebc2d21c82b9034bc2933de409fae4b90a3addd149939

  • SSDEEP

    12288:7t8vVED3Bk0Mr9Vif7/F1hIIaYHuvAIS2t:7t+gvMpVij/F1hV5HuvAI7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe
    "C:\Users\Admin\AppData\Local\Temp\ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe
      \\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:276
      • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE
        \\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:992
    • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE
      \\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v COMLOADER /d "\\.\C:\Program Files\FoxitReader\bin\COM7.EXE"
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:1668
      • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe
        \\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1188

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    757d757e9d65d4228c63b120d95bee93

    SHA1

    6e6f1f0f643858b2356a82ce0d0864d3233e9a49

    SHA256

    116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5

    SHA512

    b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165

  • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    757d757e9d65d4228c63b120d95bee93

    SHA1

    6e6f1f0f643858b2356a82ce0d0864d3233e9a49

    SHA256

    116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5

    SHA512

    b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165

  • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    757d757e9d65d4228c63b120d95bee93

    SHA1

    6e6f1f0f643858b2356a82ce0d0864d3233e9a49

    SHA256

    116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5

    SHA512

    b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165

  • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    39406608c3bc6a1fac873433268b5e6b

    SHA1

    a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a

    SHA256

    a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45

    SHA512

    e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7

  • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    39406608c3bc6a1fac873433268b5e6b

    SHA1

    a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a

    SHA256

    a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45

    SHA512

    e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7

  • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    39406608c3bc6a1fac873433268b5e6b

    SHA1

    a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a

    SHA256

    a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45

    SHA512

    e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    757d757e9d65d4228c63b120d95bee93

    SHA1

    6e6f1f0f643858b2356a82ce0d0864d3233e9a49

    SHA256

    116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5

    SHA512

    b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    757d757e9d65d4228c63b120d95bee93

    SHA1

    6e6f1f0f643858b2356a82ce0d0864d3233e9a49

    SHA256

    116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5

    SHA512

    b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    757d757e9d65d4228c63b120d95bee93

    SHA1

    6e6f1f0f643858b2356a82ce0d0864d3233e9a49

    SHA256

    116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5

    SHA512

    b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    757d757e9d65d4228c63b120d95bee93

    SHA1

    6e6f1f0f643858b2356a82ce0d0864d3233e9a49

    SHA256

    116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5

    SHA512

    b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    39406608c3bc6a1fac873433268b5e6b

    SHA1

    a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a

    SHA256

    a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45

    SHA512

    e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    39406608c3bc6a1fac873433268b5e6b

    SHA1

    a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a

    SHA256

    a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45

    SHA512

    e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    39406608c3bc6a1fac873433268b5e6b

    SHA1

    a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a

    SHA256

    a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45

    SHA512

    e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    39406608c3bc6a1fac873433268b5e6b

    SHA1

    a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a

    SHA256

    a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45

    SHA512

    e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7

  • memory/276-57-0x0000000000000000-mapping.dmp

  • memory/992-69-0x0000000000000000-mapping.dmp

  • memory/1116-54-0x0000000076031000-0x0000000076033000-memory.dmp

    Filesize

    8KB

  • memory/1188-75-0x0000000000000000-mapping.dmp

  • memory/1668-72-0x0000000000000000-mapping.dmp

  • memory/1768-63-0x0000000000000000-mapping.dmp