Analysis

  • max time kernel
    43s
  • max time network
    114s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2022 14:49

General

  • Target

    932694b1d0a75e54084e271e67c1bf8fd87aa889bf5d8137bb16cfa6f87b4f14.exe

  • Size

    302KB

  • MD5

    87817dff8804ac16744cc5bfc8e922b1

  • SHA1

    fbee28c86835f0a8f702e5e84a480cc254df99d7

  • SHA256

    932694b1d0a75e54084e271e67c1bf8fd87aa889bf5d8137bb16cfa6f87b4f14

  • SHA512

    fd58eb7e218ba118040525640a211ac6f5e6e290e4309326f26e81b6aa90b52c2eb393f23f36aaf3c89cd70edca766f93b0dddf0574e7ffa8c219eb4b1d9ba49

  • SSDEEP

    6144:GBlL/b/idtSHFKChxfgruxEMUwnjiIE6UFQBy2/m4S9eMw+m/h+1uUfuX:EVajgffInMjnjTUFQB4TTmJ+m

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\932694b1d0a75e54084e271e67c1bf8fd87aa889bf5d8137bb16cfa6f87b4f14.exe
    "C:\Users\Admin\AppData\Local\Temp\932694b1d0a75e54084e271e67c1bf8fd87aa889bf5d8137bb16cfa6f87b4f14.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
      "C:\Users\Admin\AppData\Local\Temp\932694b1d0a75e54084e271e67c1bf8fd87aa889bf5d8137bb16cfa6f87b4f14.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:976
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 1496
        3⤵
          PID:1424

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\nsyEF7F.tmp\System.dll

      Filesize

      10KB

      MD5

      56a321bd011112ec5d8a32b2f6fd3231

      SHA1

      df20e3a35a1636de64df5290ae5e4e7572447f78

      SHA256

      bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

      SHA512

      5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

    • \Users\Admin\AppData\Local\Temp\nsyEF7F.tmp\System.dll

      Filesize

      10KB

      MD5

      56a321bd011112ec5d8a32b2f6fd3231

      SHA1

      df20e3a35a1636de64df5290ae5e4e7572447f78

      SHA256

      bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

      SHA512

      5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

    • memory/976-57-0x000000000044284E-mapping.dmp

    • memory/976-59-0x00000000744F0000-0x0000000074A9B000-memory.dmp

      Filesize

      5.7MB

    • memory/976-62-0x00000000744F0000-0x0000000074A9B000-memory.dmp

      Filesize

      5.7MB

    • memory/1424-60-0x0000000000000000-mapping.dmp

    • memory/1812-54-0x0000000076411000-0x0000000076413000-memory.dmp

      Filesize

      8KB