Analysis

  • max time kernel
    48s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2022, 03:01

General

  • Target

    638143e4c5ddd34bddf2c480dddc391d4a64554fd299bbd5ed771301f4dc22bf.exe

  • Size

    1.3MB

  • MD5

    e105adf7e5d682eb483e985e0261f756

  • SHA1

    eb1db76b3713b3cc2f1a28c75a836c58e8c87fc8

  • SHA256

    638143e4c5ddd34bddf2c480dddc391d4a64554fd299bbd5ed771301f4dc22bf

  • SHA512

    301059740cac5d310cad149ba75b1055100e30e19c72d40e2f82154aa7cf89b0a01ccbf4d66392fa5e65da405cb45422e54bfa522a47a9ecc6f28c1a28dd352e

  • SSDEEP

    24576:HRyL0QZuT44qlJl99oRGig/ocJN2O2zNFH4D7oQGOYfMlQ6NY:xyYQZuTIbl999iWoWu8DBGOYcQ6NY

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\638143e4c5ddd34bddf2c480dddc391d4a64554fd299bbd5ed771301f4dc22bf.exe
    "C:\Users\Admin\AppData\Local\Temp\638143e4c5ddd34bddf2c480dddc391d4a64554fd299bbd5ed771301f4dc22bf.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" desk.cpl,InstallScreenSaver C:\Windows\Scenic- Newer Heights.scr
      2⤵
      • Modifies Control Panel
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Windows\Scenic- Newer Heights.scr
        "C:\Windows\Scenic- Newer Heights.scr" /p 65910
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious use of SetWindowsHookEx
        PID:996
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f0
    1⤵
      PID:368

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Scenic- Newer Heights.scr

      Filesize

      479KB

      MD5

      59ac3a3603f9e2227a0e8a4305d0293f

      SHA1

      a1c26bb7f43450c7202ef1ed6b459e5d95eb7998

      SHA256

      d1522bc74c121c2c1d09bfae81269c75b66e93b55119b9b60461d329c77f77e5

      SHA512

      86ccbb5db0b9d7ee39fbd9ef7300bff2de5b3a2f4a4b1ea122fd8fc4ae315775563744b98ebe9001a71fc76aaf2378ffcb2509d110651e50d9e2b8cf1a882f67

    • C:\Windows\Scenic- Newer Heights.scr

      Filesize

      479KB

      MD5

      59ac3a3603f9e2227a0e8a4305d0293f

      SHA1

      a1c26bb7f43450c7202ef1ed6b459e5d95eb7998

      SHA256

      d1522bc74c121c2c1d09bfae81269c75b66e93b55119b9b60461d329c77f77e5

      SHA512

      86ccbb5db0b9d7ee39fbd9ef7300bff2de5b3a2f4a4b1ea122fd8fc4ae315775563744b98ebe9001a71fc76aaf2378ffcb2509d110651e50d9e2b8cf1a882f67

    • C:\Windows\SysWow64\Macromed\Flash\flash8.ocx

      Filesize

      1.4MB

      MD5

      900373c059c2b51ca91bf110dbdecb33

      SHA1

      102b086d6054c2cea813ef316ce24440c458762b

      SHA256

      31453fd8f743c19e27f8fa04ee88dfebe95a7884cdfbc15ab0eb8994829aad61

      SHA512

      b17d68cd1e4f1c2fcc7f07de657af144302d4a0cb7b6a0d6bbed4fcd39227481abae73df2d59bf13a31a47b2b6aba820182881b43e638aa00da75ba6b94adbfe

    • \Windows\SysWOW64\Macromed\Flash\flash8.ocx

      Filesize

      1.4MB

      MD5

      900373c059c2b51ca91bf110dbdecb33

      SHA1

      102b086d6054c2cea813ef316ce24440c458762b

      SHA256

      31453fd8f743c19e27f8fa04ee88dfebe95a7884cdfbc15ab0eb8994829aad61

      SHA512

      b17d68cd1e4f1c2fcc7f07de657af144302d4a0cb7b6a0d6bbed4fcd39227481abae73df2d59bf13a31a47b2b6aba820182881b43e638aa00da75ba6b94adbfe

    • \Windows\SysWOW64\Macromed\Flash\flash8.ocx

      Filesize

      1.4MB

      MD5

      900373c059c2b51ca91bf110dbdecb33

      SHA1

      102b086d6054c2cea813ef316ce24440c458762b

      SHA256

      31453fd8f743c19e27f8fa04ee88dfebe95a7884cdfbc15ab0eb8994829aad61

      SHA512

      b17d68cd1e4f1c2fcc7f07de657af144302d4a0cb7b6a0d6bbed4fcd39227481abae73df2d59bf13a31a47b2b6aba820182881b43e638aa00da75ba6b94adbfe

    • memory/1376-54-0x0000000075091000-0x0000000075093000-memory.dmp

      Filesize

      8KB