Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 05:28

General

  • Target

    5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe

  • Size

    866KB

  • MD5

    24e8071ecf5c1674bb5d27237fb79a16

  • SHA1

    acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50

  • SHA256

    5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f

  • SHA512

    d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8

  • SSDEEP

    24576:bRF2i9uZvK+IdpAmdDiIP/3RUVoFtzHZ0:KioK+7UvP/RxR0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe
    "C:\Users\Admin\AppData\Local\Temp\5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\ProgramData\03005109\03005109.bat" "
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c start C:\PROGRA~3\03005109\03005109.exe /i
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\PROGRA~3\03005109\03005109.exe
          C:\PROGRA~3\03005109\03005109.exe /i
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1124

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\03005109\03005109.exe

    Filesize

    866KB

    MD5

    24e8071ecf5c1674bb5d27237fb79a16

    SHA1

    acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50

    SHA256

    5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f

    SHA512

    d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8

  • C:\PROGRA~3\03005109\03005109.exe

    Filesize

    866KB

    MD5

    24e8071ecf5c1674bb5d27237fb79a16

    SHA1

    acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50

    SHA256

    5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f

    SHA512

    d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8

  • C:\ProgramData\03005109\03005109.bat

    Filesize

    230B

    MD5

    cf0845bd542b356dee3f4f3743c0e276

    SHA1

    c68741052ebb92e1082960ec132f87773d8414a2

    SHA256

    bf4a143c76fc37f586403ee51d73c4483274308816f951cd044393dbe26da012

    SHA512

    bd6b9a5e612dd9091ef2a41082bc1e2679def7dbba85428dc82b14f96cfc8b329307db464c8706557bb5ac3903961a09299a403152692df7d06a81b0f64bc2ac

  • \PROGRA~3\03005109\03005109.exe

    Filesize

    866KB

    MD5

    24e8071ecf5c1674bb5d27237fb79a16

    SHA1

    acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50

    SHA256

    5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f

    SHA512

    d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8

  • \PROGRA~3\03005109\03005109.exe

    Filesize

    866KB

    MD5

    24e8071ecf5c1674bb5d27237fb79a16

    SHA1

    acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50

    SHA256

    5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f

    SHA512

    d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8

  • \PROGRA~3\03005109\03005109.exe

    Filesize

    866KB

    MD5

    24e8071ecf5c1674bb5d27237fb79a16

    SHA1

    acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50

    SHA256

    5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f

    SHA512

    d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8

  • \PROGRA~3\03005109\03005109.exe

    Filesize

    866KB

    MD5

    24e8071ecf5c1674bb5d27237fb79a16

    SHA1

    acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50

    SHA256

    5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f

    SHA512

    d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8

  • \PROGRA~3\03005109\03005109.exe

    Filesize

    866KB

    MD5

    24e8071ecf5c1674bb5d27237fb79a16

    SHA1

    acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50

    SHA256

    5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f

    SHA512

    d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8

  • memory/1124-63-0x0000000000000000-mapping.dmp

  • memory/1124-67-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/1124-68-0x0000000000753000-0x0000000000756000-memory.dmp

    Filesize

    12KB

  • memory/1124-71-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/1124-72-0x0000000000753000-0x0000000000756000-memory.dmp

    Filesize

    12KB

  • memory/1292-55-0x0000000000000000-mapping.dmp

  • memory/1756-59-0x0000000000000000-mapping.dmp

  • memory/1940-56-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/1940-54-0x0000000075B41000-0x0000000075B43000-memory.dmp

    Filesize

    8KB

  • memory/1940-57-0x00000000006A3000-0x00000000006A6000-memory.dmp

    Filesize

    12KB