Analysis

  • max time kernel
    135s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 09:04

General

  • Target

    468ea05c02157caf6f5854e33950ee3548064676ff71d3139ded42bdfac2fc76.exe

  • Size

    827KB

  • MD5

    10cfaf565b24613ba8e6ef647dfc5ac0

  • SHA1

    2bde2a279cfb86c8f1bf74c43771994e044ed5e4

  • SHA256

    468ea05c02157caf6f5854e33950ee3548064676ff71d3139ded42bdfac2fc76

  • SHA512

    9d471bbab5a68991d43f975ff73c538cb3bd0a66b0ab09e716fe31226b818806d28d1368ed57dc96d2c79df256306a1e31cbdaff2e8b1e7dda38fc0381e9579d

  • SSDEEP

    12288:2CjutZu0UMuiwNwn6wfBvg7FbPKVYl6+2gKkMfk2cdC0+m687KUOxe5yxl:2LtwNwn6w5vgJbPKVf+2Dk7dzf68GUS

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 46 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\468ea05c02157caf6f5854e33950ee3548064676ff71d3139ded42bdfac2fc76.exe
    "C:\Users\Admin\AppData\Local\Temp\468ea05c02157caf6f5854e33950ee3548064676ff71d3139ded42bdfac2fc76.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Windows\ZAYUOZBIDUJF.dll"
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1464
    • C:\Users\Admin\AppData\Local\Temp\GrillGrill.exe
      "C:\Users\Admin\AppData\Local\Temp\GrillGrill.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:628
    • C:\Users\Admin\AppData\Local\Temp\GrillGrill.exe
      C:\Users\Admin\AppData\Local\Temp\GrillGrill.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:1712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GrillGrill.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • C:\Users\Admin\AppData\Local\Temp\GrillGrill.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • C:\Windows\ZAYUOZBIDUJF.dll

    Filesize

    859KB

    MD5

    5f590593f5de92de3745a6b311898d4b

    SHA1

    4edbfe9fd328e381a03b23694087068641a7191f

    SHA256

    9b49d7b0aedb0173ad6729c3a18f24595aaf693be52731b26cfc073828fb3839

    SHA512

    605b68552c347bf2b3bed4c6ebcc9fb65446f07ee619b231c4817b0fcd858ea3989875599c662d7caedc4f759e99d90d56aafc83d2d7f3ac9f2ae4146b6c0ea7

  • \Users\Admin\AppData\Local\Temp\GrillGrill.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • \Users\Admin\AppData\Local\Temp\GrillGrill.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • \Users\Admin\AppData\Local\Temp\GrillGrill.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • \Users\Admin\AppData\Local\Temp\GrillGrill.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • memory/808-54-0x0000000075B41000-0x0000000075B43000-memory.dmp

    Filesize

    8KB