Analysis

  • max time kernel
    152s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 03:30

General

  • Target

    c70867e6da7dfe18a0221c7184784f8143909031d67e5251ae32e8d774be8d9e.exe

  • Size

    999KB

  • MD5

    a304f49554ed7ebb5b9b512708b717e1

  • SHA1

    d4582d81d7a2f13f31100f2b858c0f64e6b2889b

  • SHA256

    c70867e6da7dfe18a0221c7184784f8143909031d67e5251ae32e8d774be8d9e

  • SHA512

    52edcbcf88dc5339ace5122a482c6909aee03e61ea4a69998efc14e7e62e62f21ae660269c635d3bad2333101aeb9436a3ce84330ab82bcb989583dada1b242d

  • SSDEEP

    6144:a+nglw9ayQv3ahvyn/PU7O0KXgTTSjyEN2ERBOzllz5jtGvA4qVub/OBHDbXDgbM:rjS3Yvyn/0Tvlzq44qEUTDzLFt

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c70867e6da7dfe18a0221c7184784f8143909031d67e5251ae32e8d774be8d9e.exe
    "C:\Users\Admin\AppData\Local\Temp\c70867e6da7dfe18a0221c7184784f8143909031d67e5251ae32e8d774be8d9e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Windows\SysWOW64\reg.exe
        reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f
        3⤵
        • Adds Run key to start application
        PID:1168
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\reg.exe
        reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f
        3⤵
        • Adds Run key to start application
        PID:1976
    • C:\windows\temp\34212.exe
      "C:\windows\temp\34212.exe"
      2⤵
      • Executes dropped EXE
      PID:1280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Temp\34212.exe

    Filesize

    117KB

    MD5

    a31cad2960a660cb558b32ba7236b49e

    SHA1

    b9aaaade26a07000d13550ec2de5008315750d65

    SHA256

    763fccd41404d4ea9191df4aa36ffe603d932cf54279aa8260fe1eaeb7f800bf

    SHA512

    d4652d059f3c9510846497188e697c1b9af0b5ab710046eb25ff965d760c4a35db1270bfd4fe8bebf59add3c63bf9173ee194c3b145f974f52c393e0bd47d0cf

  • \Windows\Temp\34212.exe

    Filesize

    117KB

    MD5

    a31cad2960a660cb558b32ba7236b49e

    SHA1

    b9aaaade26a07000d13550ec2de5008315750d65

    SHA256

    763fccd41404d4ea9191df4aa36ffe603d932cf54279aa8260fe1eaeb7f800bf

    SHA512

    d4652d059f3c9510846497188e697c1b9af0b5ab710046eb25ff965d760c4a35db1270bfd4fe8bebf59add3c63bf9173ee194c3b145f974f52c393e0bd47d0cf

  • \Windows\Temp\34212.exe

    Filesize

    117KB

    MD5

    a31cad2960a660cb558b32ba7236b49e

    SHA1

    b9aaaade26a07000d13550ec2de5008315750d65

    SHA256

    763fccd41404d4ea9191df4aa36ffe603d932cf54279aa8260fe1eaeb7f800bf

    SHA512

    d4652d059f3c9510846497188e697c1b9af0b5ab710046eb25ff965d760c4a35db1270bfd4fe8bebf59add3c63bf9173ee194c3b145f974f52c393e0bd47d0cf

  • memory/1168-58-0x0000000000000000-mapping.dmp

  • memory/1280-61-0x0000000000000000-mapping.dmp

  • memory/1704-56-0x0000000000000000-mapping.dmp

  • memory/1708-54-0x0000000075451000-0x0000000075453000-memory.dmp

    Filesize

    8KB

  • memory/1856-55-0x0000000000000000-mapping.dmp

  • memory/1976-57-0x0000000000000000-mapping.dmp