Analysis

  • max time kernel
    134s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 08:24

General

  • Target

    4a747d4fac877f1360e277ad747a8691c2f45204dd995ee345c70df174ce06de.exe

  • Size

    225KB

  • MD5

    93e587567da77cc5e0d2f376545e7fe0

  • SHA1

    2af868dab0a6012375ab4d0a70ef589bc8036aec

  • SHA256

    4a747d4fac877f1360e277ad747a8691c2f45204dd995ee345c70df174ce06de

  • SHA512

    2377ab758478b6a2a67d1d1466e04494181ed58176b8ec25737ca47903fc3309b6515faf3c8e77fd7610edbddbcf01908372a68a66023b0470b1996ef2042a4e

  • SSDEEP

    3072:NQIURTXJH451v0hKiuCt06J34TdQYcZEFwPhoTbf8vBYJdYrjxk+BdeMiksdkV+C:NslOshKiPcQYcZEFsoTzT4O+bebkmIr

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a747d4fac877f1360e277ad747a8691c2f45204dd995ee345c70df174ce06de.exe
    "C:\Users\Admin\AppData\Local\Temp\4a747d4fac877f1360e277ad747a8691c2f45204dd995ee345c70df174ce06de.exe"
    1⤵
    • Loads dropped DLL
    PID:3872

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsvE3CF.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

  • C:\Users\Admin\AppData\Local\Temp\nsvE3CF.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

  • C:\Users\Admin\AppData\Local\Temp\nsvE3CF.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399

  • C:\Users\Admin\AppData\Local\Temp\nsvE3CF.tmp\inetc.dll

    Filesize

    20KB

    MD5

    f02155fa3e59a8fc48a74a236b2bb42e

    SHA1

    6d76ee8f86fb29f3352c9546250d940f1a476fb8

    SHA256

    096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999

    SHA512

    8be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399