Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 11:37

General

  • Target

    fca433a52cd8d1d50fb1ccf7e511362de7c65309331ae4af4a79cecbf508a637.exe

  • Size

    205KB

  • MD5

    571b59595589be1c9e4c60d277ace9a0

  • SHA1

    0b085b239483eba4b9c19db92cb3e1a4ec371d02

  • SHA256

    fca433a52cd8d1d50fb1ccf7e511362de7c65309331ae4af4a79cecbf508a637

  • SHA512

    ddb5e83d26cd73230653b25116c0caeaf00acf9e1440dad399cece4dec00b1506961611ed788b36ef5cae26e6b5c44d1288f45f2f2932d9b0c2d2e8e301b6c8e

  • SSDEEP

    3072:bS8BCfoDaXJNMQW1km6QVoXAl1k4M5jINDlmNYq8exfSXnyY6Q5wMPfqjn8aeqCL:bPB6EQ3HQeXAVM5sJmN18ek7KMW83f0s

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fca433a52cd8d1d50fb1ccf7e511362de7c65309331ae4af4a79cecbf508a637.exe
    "C:\Users\Admin\AppData\Local\Temp\fca433a52cd8d1d50fb1ccf7e511362de7c65309331ae4af4a79cecbf508a637.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4996
    • C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe
      "C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2460
      • C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe
        "C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe"
        3⤵
        • Executes dropped EXE
        PID:4080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe

    Filesize

    278KB

    MD5

    48f02eb6f815380e758b63ba0dcb53ad

    SHA1

    d49e6b869e47d9b4b28b2e9ded6a173e146cf908

    SHA256

    264ac22a85e9a21eaee624096cbfe0101624cdac120fa460207526b0df7a01b7

    SHA512

    c8b7cd58ba20ad15ca6e3e6941f4d3bd2da28130b5f1f89dc075f087e573c70de33d5fcc055f444ff54edeace97a7233c4b17e9627be913b94d811fe718304a8

  • C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe

    Filesize

    278KB

    MD5

    48f02eb6f815380e758b63ba0dcb53ad

    SHA1

    d49e6b869e47d9b4b28b2e9ded6a173e146cf908

    SHA256

    264ac22a85e9a21eaee624096cbfe0101624cdac120fa460207526b0df7a01b7

    SHA512

    c8b7cd58ba20ad15ca6e3e6941f4d3bd2da28130b5f1f89dc075f087e573c70de33d5fcc055f444ff54edeace97a7233c4b17e9627be913b94d811fe718304a8

  • C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe

    Filesize

    278KB

    MD5

    48f02eb6f815380e758b63ba0dcb53ad

    SHA1

    d49e6b869e47d9b4b28b2e9ded6a173e146cf908

    SHA256

    264ac22a85e9a21eaee624096cbfe0101624cdac120fa460207526b0df7a01b7

    SHA512

    c8b7cd58ba20ad15ca6e3e6941f4d3bd2da28130b5f1f89dc075f087e573c70de33d5fcc055f444ff54edeace97a7233c4b17e9627be913b94d811fe718304a8

  • C:\Users\Admin\AppData\Local\Temp\nst77C7.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • memory/2460-133-0x0000000000000000-mapping.dmp

  • memory/2460-139-0x00000000021B0000-0x00000000021B4000-memory.dmp

    Filesize

    16KB

  • memory/4080-136-0x0000000000000000-mapping.dmp

  • memory/4080-137-0x0000000000400000-0x00000000036C8000-memory.dmp

    Filesize

    50.8MB

  • memory/4080-141-0x0000000000400000-0x00000000036C8000-memory.dmp

    Filesize

    50.8MB

  • memory/4080-142-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4080-143-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB