Analysis

  • max time kernel
    149s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 03:31

General

  • Target

    2ca87f44cb8c43acfd7fbd1553439f029b06666a5b891d0a162bc889b5812f91.exe

  • Size

    941KB

  • MD5

    5dc1cfe63eae44a81bda99350e29020b

  • SHA1

    fd516f851784eecd10e4ff38e2b54f897c2c1a66

  • SHA256

    2ca87f44cb8c43acfd7fbd1553439f029b06666a5b891d0a162bc889b5812f91

  • SHA512

    8d604af7079d0ce74a89b88e3fbf1e65a138a90ca6699a2750431a7a2c2a3600a1ece83a00bad4e67d233907ea60627272bb870e502289079a541467e2e1ad46

  • SSDEEP

    12288:rj9l69ZU++3jUOIcr1MFNXJU6MqmITDpgrJ9YQ1DNIZmzIbwUB/9:rDsOIcrMXPMq6RimzIbwu/9

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ca87f44cb8c43acfd7fbd1553439f029b06666a5b891d0a162bc889b5812f91.exe
    "C:\Users\Admin\AppData\Local\Temp\2ca87f44cb8c43acfd7fbd1553439f029b06666a5b891d0a162bc889b5812f91.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Windows\SysWOW64\reg.exe
        reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f
        3⤵
        • Adds Run key to start application
        PID:856
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1452
      • C:\Windows\SysWOW64\reg.exe
        reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f
        3⤵
        • Adds Run key to start application
        PID:864
    • C:\windows\temp\31332.exe
      "C:\windows\temp\31332.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1752

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Temp\31332.exe

          Filesize

          312KB

          MD5

          6b5ed259ffcdd40663007b6047e1efe0

          SHA1

          c2a1991493682285eed4ecf3e47b27431d8ea0db

          SHA256

          b9320542d9e3dab454881b771c3895e1bdc96d603379cbb597fd8bd7dc9f2719

          SHA512

          9ecaed27389750f0902dfdfc59fae513b6870c13238e0d89c7bd9c05bc000d4f60dc7f3601e68e3c87bdd609a9df1b723a67442f49a37e5659cbaefc8452ec31

        • \Windows\Temp\31332.exe

          Filesize

          312KB

          MD5

          6b5ed259ffcdd40663007b6047e1efe0

          SHA1

          c2a1991493682285eed4ecf3e47b27431d8ea0db

          SHA256

          b9320542d9e3dab454881b771c3895e1bdc96d603379cbb597fd8bd7dc9f2719

          SHA512

          9ecaed27389750f0902dfdfc59fae513b6870c13238e0d89c7bd9c05bc000d4f60dc7f3601e68e3c87bdd609a9df1b723a67442f49a37e5659cbaefc8452ec31

        • memory/1920-54-0x0000000076181000-0x0000000076183000-memory.dmp

          Filesize

          8KB