Analysis

  • max time kernel
    145s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 23:31

General

  • Target

    9533433685bddbfcc90989343cf5506def8b5796044169694f5b3db4c20b9692.exe

  • Size

    296KB

  • MD5

    907e0f6d69c608b7e1cab2696073e609

  • SHA1

    2ac742a58f3ea8c5436a262c55c87bd50340e9e4

  • SHA256

    9533433685bddbfcc90989343cf5506def8b5796044169694f5b3db4c20b9692

  • SHA512

    f808f7c966a4de2a4d29f67e9d8eb43792804344d272ea16ff148a9d256b5896c0b109362cf508c496c6bcb9e0b0c89c9f62b6d3c5c781ec6ba616a38092a451

  • SSDEEP

    6144:vyH7xOc6H5c6HcT66vlm/Bm9hj2DR9nxTNkUmTFME7y5B8TjZMdMMF6F6a:vaQQhj2D3xTNkfCoIB8tvGQ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9533433685bddbfcc90989343cf5506def8b5796044169694f5b3db4c20b9692.exe
    "C:\Users\Admin\AppData\Local\Temp\9533433685bddbfcc90989343cf5506def8b5796044169694f5b3db4c20b9692.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4352
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\9533433685bddbfcc90989343cf5506def8b5796044169694f5b3db4c20b9692.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Users\Admin\AppData\Local\Temp\9533433685bddbfcc90989343cf5506def8b5796044169694f5b3db4c20b9692.exe
        "C:\Users\Admin\AppData\Local\Temp\9533433685bddbfcc90989343cf5506def8b5796044169694f5b3db4c20b9692.exe"
        3⤵
        • Executes dropped EXE
        PID:2888
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:4692

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9533433685bddbfcc90989343cf5506def8b5796044169694f5b3db4c20b9692.exe

    Filesize

    261KB

    MD5

    855d90f1d484befb55627d1ecef2d040

    SHA1

    40d0689c8558fc1fdcfde8509cf0d5b596b807b8

    SHA256

    c7735e76a2b303c032c6f84404dad386273b07b3274496169bca2437d28837aa

    SHA512

    5d786ebf980fbc5682e8ba91a69ef23622cfd52455fe27c494aa29d50e059331c8184a0e5f4922d608dc89fabed5cc85676a67bfdeb2292dbaca3dc5b9bb0725

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b