Analysis

  • max time kernel
    137s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 06:12

General

  • Target

    0550f59e16a209918880a41ef7ca96524dbbff627092772f09ddcda8f02f4729.exe

  • Size

    1.1MB

  • MD5

    846be6730c2eb8cb94666900f18e4eb0

  • SHA1

    f5bb3b3c7a39dae33cb69f1aad7a06517936c9ac

  • SHA256

    0550f59e16a209918880a41ef7ca96524dbbff627092772f09ddcda8f02f4729

  • SHA512

    de3f648d7ac17b734b66299d25d778d7b206006c5e4b8fae402e53040acd32265084329c6bc5114150183af548114fcd43dc5d3739fd28a646551160b28c752e

  • SSDEEP

    24576:XN6MKlvRkomXoVGMvSsIfCFHhUC4Y5a/AlAUJi2oii4r0CZxrHmOtI:8MKM8G0SYHN4Y5EAlAzLixBZNGOW

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0550f59e16a209918880a41ef7ca96524dbbff627092772f09ddcda8f02f4729.exe
    "C:\Users\Admin\AppData\Local\Temp\0550f59e16a209918880a41ef7ca96524dbbff627092772f09ddcda8f02f4729.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4100
    • C:\Windows\SysWOW64\explorer.exe
      explorer C:\Users\Admin\AppData\Local\Temp\
      2⤵
        PID:4980
      • C:\Windows\SysWOW64\534df2\WA5AEA5.EXE
        C:\Windows\system32\\534df2\WA5AEA5.EXE
        2⤵
        • Executes dropped EXE
        • Drops startup file
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Windows\SysWOW64\534df2\NT-3E113ACB.EXE
          C:\Windows\SysWOW64\534df2\NT-3E113ACB.EXE 4|-|SOFTWARE\Microsoft\Windows\CurrentVersion\Run\D72374|-|C:\Windows\SysWOW64\534df2\WA5AEA5.EXE|-|0
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of SetWindowsHookEx
          PID:1364
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1532
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1816

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\E_N4\dp1.fne

              Filesize

              124KB

              MD5

              d4caf8bc1ae352839b41da5f1ba42a5d

              SHA1

              9ce27e66ec65ebf98b863a4a63c7daaac0ecf831

              SHA256

              9cc2591e7324bf7b6a96918dfd005746559d3756a508d988b1fc64764545e602

              SHA512

              80cbea3e1473be6a94ae607efdca5b289625b4e6711bcb8b707ff7dd61c8d5a379d0095d12f3d86ffbc695086d8101abdfc2395f178ad07e9c7c7cdad9c835c6

            • C:\Users\Admin\AppData\Local\Temp\E_N4\dp1.fne

              Filesize

              124KB

              MD5

              d4caf8bc1ae352839b41da5f1ba42a5d

              SHA1

              9ce27e66ec65ebf98b863a4a63c7daaac0ecf831

              SHA256

              9cc2591e7324bf7b6a96918dfd005746559d3756a508d988b1fc64764545e602

              SHA512

              80cbea3e1473be6a94ae607efdca5b289625b4e6711bcb8b707ff7dd61c8d5a379d0095d12f3d86ffbc695086d8101abdfc2395f178ad07e9c7c7cdad9c835c6

            • C:\Users\Admin\AppData\Local\Temp\E_N4\krnln.fnr

              Filesize

              1.1MB

              MD5

              70aab290e25f4a7524b348058e057b2e

              SHA1

              a1eddb7a40ec8953255185a0bb39fcb173345cf8

              SHA256

              75256cae423bca49d75fd9259dc30f7b465bd03560938997c5bc4b0e03b8b769

              SHA512

              7c8c69246b3533f0585dd3c02a61546a74fbf6c50bc294dc252c368b3b8991cfca5956ddc0af6fba801a5a3e47022a26a06033e028f3c0aeb3744e1d3c4b2d8b

            • C:\Windows\SysWOW64\534df2\HtmlView.fne

              Filesize

              212KB

              MD5

              4c9e8f81bf741a61915d0d4fc49d595e

              SHA1

              d033008b3a0e5d3fc8876e0423ee5509ecb3897c

              SHA256

              951d725f4a12cd4ff713ca147fa3be08a02367db6731283c3f1ba30445990129

              SHA512

              cf2c6f8f471c8a5aad563bc257035515860689b73ce343599c7713de8bc8338a031a722f366e005bc1907d6fc97b68b8b415e8ff05b7324fb1040c5dc02315d7

            • C:\Windows\SysWOW64\534df2\HtmlView.fne

              Filesize

              212KB

              MD5

              4c9e8f81bf741a61915d0d4fc49d595e

              SHA1

              d033008b3a0e5d3fc8876e0423ee5509ecb3897c

              SHA256

              951d725f4a12cd4ff713ca147fa3be08a02367db6731283c3f1ba30445990129

              SHA512

              cf2c6f8f471c8a5aad563bc257035515860689b73ce343599c7713de8bc8338a031a722f366e005bc1907d6fc97b68b8b415e8ff05b7324fb1040c5dc02315d7

            • C:\Windows\SysWOW64\534df2\HtmlView.fne

              Filesize

              212KB

              MD5

              4c9e8f81bf741a61915d0d4fc49d595e

              SHA1

              d033008b3a0e5d3fc8876e0423ee5509ecb3897c

              SHA256

              951d725f4a12cd4ff713ca147fa3be08a02367db6731283c3f1ba30445990129

              SHA512

              cf2c6f8f471c8a5aad563bc257035515860689b73ce343599c7713de8bc8338a031a722f366e005bc1907d6fc97b68b8b415e8ff05b7324fb1040c5dc02315d7

            • C:\Windows\SysWOW64\534df2\HtmlView.fne

              Filesize

              212KB

              MD5

              4c9e8f81bf741a61915d0d4fc49d595e

              SHA1

              d033008b3a0e5d3fc8876e0423ee5509ecb3897c

              SHA256

              951d725f4a12cd4ff713ca147fa3be08a02367db6731283c3f1ba30445990129

              SHA512

              cf2c6f8f471c8a5aad563bc257035515860689b73ce343599c7713de8bc8338a031a722f366e005bc1907d6fc97b68b8b415e8ff05b7324fb1040c5dc02315d7

            • C:\Windows\SysWOW64\534df2\HtmlView.fne

              Filesize

              212KB

              MD5

              4c9e8f81bf741a61915d0d4fc49d595e

              SHA1

              d033008b3a0e5d3fc8876e0423ee5509ecb3897c

              SHA256

              951d725f4a12cd4ff713ca147fa3be08a02367db6731283c3f1ba30445990129

              SHA512

              cf2c6f8f471c8a5aad563bc257035515860689b73ce343599c7713de8bc8338a031a722f366e005bc1907d6fc97b68b8b415e8ff05b7324fb1040c5dc02315d7

            • C:\Windows\SysWOW64\534df2\NT-3E113ACB.EXE

              Filesize

              46KB

              MD5

              5b4851334904cc468bc93710b5d97360

              SHA1

              e9ebc02ce6003c380068d039a1bf3593792297eb

              SHA256

              fc7ee06c725f079c624d76eb7652bafa7d32ac64cf7b897287a49b5184306ed8

              SHA512

              1d9b21b85d430581a81fc6784a71660cc3db7df127873013ee9212706f1960800a655d463b89987a361fa959a6e4597f65e885da330e54ee2f719e0d539cc562

            • C:\Windows\SysWOW64\534df2\NT-3E113ACB.EXE

              Filesize

              46KB

              MD5

              5b4851334904cc468bc93710b5d97360

              SHA1

              e9ebc02ce6003c380068d039a1bf3593792297eb

              SHA256

              fc7ee06c725f079c624d76eb7652bafa7d32ac64cf7b897287a49b5184306ed8

              SHA512

              1d9b21b85d430581a81fc6784a71660cc3db7df127873013ee9212706f1960800a655d463b89987a361fa959a6e4597f65e885da330e54ee2f719e0d539cc562

            • C:\Windows\SysWOW64\534df2\WA5AEA5.EXE

              Filesize

              46KB

              MD5

              5b4851334904cc468bc93710b5d97360

              SHA1

              e9ebc02ce6003c380068d039a1bf3593792297eb

              SHA256

              fc7ee06c725f079c624d76eb7652bafa7d32ac64cf7b897287a49b5184306ed8

              SHA512

              1d9b21b85d430581a81fc6784a71660cc3db7df127873013ee9212706f1960800a655d463b89987a361fa959a6e4597f65e885da330e54ee2f719e0d539cc562

            • C:\Windows\SysWOW64\534df2\WA5AEA5.EXE

              Filesize

              46KB

              MD5

              5b4851334904cc468bc93710b5d97360

              SHA1

              e9ebc02ce6003c380068d039a1bf3593792297eb

              SHA256

              fc7ee06c725f079c624d76eb7652bafa7d32ac64cf7b897287a49b5184306ed8

              SHA512

              1d9b21b85d430581a81fc6784a71660cc3db7df127873013ee9212706f1960800a655d463b89987a361fa959a6e4597f65e885da330e54ee2f719e0d539cc562

            • C:\Windows\SysWOW64\534df2\dp1.fne

              Filesize

              124KB

              MD5

              d4caf8bc1ae352839b41da5f1ba42a5d

              SHA1

              9ce27e66ec65ebf98b863a4a63c7daaac0ecf831

              SHA256

              9cc2591e7324bf7b6a96918dfd005746559d3756a508d988b1fc64764545e602

              SHA512

              80cbea3e1473be6a94ae607efdca5b289625b4e6711bcb8b707ff7dd61c8d5a379d0095d12f3d86ffbc695086d8101abdfc2395f178ad07e9c7c7cdad9c835c6

            • C:\Windows\SysWOW64\534df2\dp1.fne

              Filesize

              124KB

              MD5

              d4caf8bc1ae352839b41da5f1ba42a5d

              SHA1

              9ce27e66ec65ebf98b863a4a63c7daaac0ecf831

              SHA256

              9cc2591e7324bf7b6a96918dfd005746559d3756a508d988b1fc64764545e602

              SHA512

              80cbea3e1473be6a94ae607efdca5b289625b4e6711bcb8b707ff7dd61c8d5a379d0095d12f3d86ffbc695086d8101abdfc2395f178ad07e9c7c7cdad9c835c6

            • C:\Windows\SysWOW64\534df2\dp1.fne

              Filesize

              124KB

              MD5

              d4caf8bc1ae352839b41da5f1ba42a5d

              SHA1

              9ce27e66ec65ebf98b863a4a63c7daaac0ecf831

              SHA256

              9cc2591e7324bf7b6a96918dfd005746559d3756a508d988b1fc64764545e602

              SHA512

              80cbea3e1473be6a94ae607efdca5b289625b4e6711bcb8b707ff7dd61c8d5a379d0095d12f3d86ffbc695086d8101abdfc2395f178ad07e9c7c7cdad9c835c6

            • C:\Windows\SysWOW64\534df2\eAPI.fne

              Filesize

              328KB

              MD5

              7bcb58659e959d65514c45cd01bfc8e4

              SHA1

              c2f41529a536c746ac0cf92c026dea65798f3ee7

              SHA256

              f37248aa68d84818fba2b1ea160d7eec4d3f426eeca4d215c8db8d8389d18388

              SHA512

              0b33bbcb059de95e74e9e115fb09ca73846720041113c9cab10e5dec40024136241d66a92181527e36db714c4c96ee532b7df00ae2c10798d8bea947f6762217

            • C:\Windows\SysWOW64\534df2\eAPI.fne

              Filesize

              328KB

              MD5

              7bcb58659e959d65514c45cd01bfc8e4

              SHA1

              c2f41529a536c746ac0cf92c026dea65798f3ee7

              SHA256

              f37248aa68d84818fba2b1ea160d7eec4d3f426eeca4d215c8db8d8389d18388

              SHA512

              0b33bbcb059de95e74e9e115fb09ca73846720041113c9cab10e5dec40024136241d66a92181527e36db714c4c96ee532b7df00ae2c10798d8bea947f6762217

            • C:\Windows\SysWOW64\534df2\eAPI.fne

              Filesize

              328KB

              MD5

              7bcb58659e959d65514c45cd01bfc8e4

              SHA1

              c2f41529a536c746ac0cf92c026dea65798f3ee7

              SHA256

              f37248aa68d84818fba2b1ea160d7eec4d3f426eeca4d215c8db8d8389d18388

              SHA512

              0b33bbcb059de95e74e9e115fb09ca73846720041113c9cab10e5dec40024136241d66a92181527e36db714c4c96ee532b7df00ae2c10798d8bea947f6762217

            • C:\Windows\SysWOW64\534df2\krnln.fnr

              Filesize

              1.1MB

              MD5

              70aab290e25f4a7524b348058e057b2e

              SHA1

              a1eddb7a40ec8953255185a0bb39fcb173345cf8

              SHA256

              75256cae423bca49d75fd9259dc30f7b465bd03560938997c5bc4b0e03b8b769

              SHA512

              7c8c69246b3533f0585dd3c02a61546a74fbf6c50bc294dc252c368b3b8991cfca5956ddc0af6fba801a5a3e47022a26a06033e028f3c0aeb3744e1d3c4b2d8b

            • C:\Windows\SysWOW64\534df2\krnln.fnr

              Filesize

              1.1MB

              MD5

              70aab290e25f4a7524b348058e057b2e

              SHA1

              a1eddb7a40ec8953255185a0bb39fcb173345cf8

              SHA256

              75256cae423bca49d75fd9259dc30f7b465bd03560938997c5bc4b0e03b8b769

              SHA512

              7c8c69246b3533f0585dd3c02a61546a74fbf6c50bc294dc252c368b3b8991cfca5956ddc0af6fba801a5a3e47022a26a06033e028f3c0aeb3744e1d3c4b2d8b

            • C:\Windows\SysWOW64\534df2\krnln.fnr

              Filesize

              1.1MB

              MD5

              70aab290e25f4a7524b348058e057b2e

              SHA1

              a1eddb7a40ec8953255185a0bb39fcb173345cf8

              SHA256

              75256cae423bca49d75fd9259dc30f7b465bd03560938997c5bc4b0e03b8b769

              SHA512

              7c8c69246b3533f0585dd3c02a61546a74fbf6c50bc294dc252c368b3b8991cfca5956ddc0af6fba801a5a3e47022a26a06033e028f3c0aeb3744e1d3c4b2d8b

            • memory/1364-167-0x00000000022E0000-0x0000000002318000-memory.dmp

              Filesize

              224KB

            • memory/1364-171-0x0000000010000000-0x000000001011D000-memory.dmp

              Filesize

              1.1MB

            • memory/1364-170-0x0000000010000000-0x000000001011D000-memory.dmp

              Filesize

              1.1MB

            • memory/1364-169-0x0000000000400000-0x000000000040F000-memory.dmp

              Filesize

              60KB

            • memory/1760-160-0x0000000002570000-0x0000000002591000-memory.dmp

              Filesize

              132KB

            • memory/1760-146-0x00000000020E0000-0x0000000002118000-memory.dmp

              Filesize

              224KB

            • memory/1760-155-0x0000000002C00000-0x0000000002C61000-memory.dmp

              Filesize

              388KB

            • memory/1760-149-0x0000000000400000-0x000000000040F000-memory.dmp

              Filesize

              60KB

            • memory/1760-150-0x0000000010000000-0x000000001011D000-memory.dmp

              Filesize

              1.1MB

            • memory/1760-172-0x0000000010000000-0x000000001011D000-memory.dmp

              Filesize

              1.1MB

            • memory/1760-173-0x0000000002570000-0x0000000002591000-memory.dmp

              Filesize

              132KB

            • memory/4100-148-0x0000000002210000-0x0000000002231000-memory.dmp

              Filesize

              132KB

            • memory/4100-135-0x0000000010000000-0x000000001011D000-memory.dmp

              Filesize

              1.1MB

            • memory/4100-134-0x0000000000400000-0x000000000046A000-memory.dmp

              Filesize

              424KB

            • memory/4100-151-0x0000000010000000-0x000000001011D000-memory.dmp

              Filesize

              1.1MB