Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 09:52

General

  • Target

    0131c05a93388e0595e99b9d7b78c4ae21dc0e1fd4b8b7ae3f6d85607a81db1a.exe

  • Size

    19KB

  • MD5

    28b3d87d24f2fac5ccf2205c0fa93430

  • SHA1

    9ab8d489576664e49b798f70252053722c7c0d24

  • SHA256

    0131c05a93388e0595e99b9d7b78c4ae21dc0e1fd4b8b7ae3f6d85607a81db1a

  • SHA512

    ccc437b4189ee8439648394f2109c0bfd37c608e41c86e25ea58282f9bad5eaaab9dc77c01bc0f29ed39cd47cf93ade39a29d79d58ae820e40675ecf83d441ce

  • SSDEEP

    384:Idu9LNL1QFars3y3bQpYZRDtY8alJZjLzu/vHfBy6:IM9LCWn8ZjL8PfBy6

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0131c05a93388e0595e99b9d7b78c4ae21dc0e1fd4b8b7ae3f6d85607a81db1a.exe
    "C:\Users\Admin\AppData\Local\Temp\0131c05a93388e0595e99b9d7b78c4ae21dc0e1fd4b8b7ae3f6d85607a81db1a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Users\Admin\AppData\Local\Temp\realupdater.exe
      "C:\Users\Admin\AppData\Local\Temp\realupdater.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\realupdater.exe

    Filesize

    19KB

    MD5

    dd24323a524f58c94fc669406f53d82d

    SHA1

    05bab447fa3830b407e8a8a4e7a2d54185bce7ec

    SHA256

    8c851e28c947210effb59740d04ead4a76178027e71cbf0ca24a15c0a5c84104

    SHA512

    b3daf833c6a68c75f5049462efa228e2a2b4d98d86044ee6a3b3ca1df1614f9044afd274f1d31428590c49f49cee68d3a9ad7edae76eaada9eabff5db7e00e9d

  • C:\Users\Admin\AppData\Local\Temp\realupdater.exe

    Filesize

    19KB

    MD5

    dd24323a524f58c94fc669406f53d82d

    SHA1

    05bab447fa3830b407e8a8a4e7a2d54185bce7ec

    SHA256

    8c851e28c947210effb59740d04ead4a76178027e71cbf0ca24a15c0a5c84104

    SHA512

    b3daf833c6a68c75f5049462efa228e2a2b4d98d86044ee6a3b3ca1df1614f9044afd274f1d31428590c49f49cee68d3a9ad7edae76eaada9eabff5db7e00e9d

  • \Users\Admin\AppData\Local\Temp\realupdater.exe

    Filesize

    19KB

    MD5

    dd24323a524f58c94fc669406f53d82d

    SHA1

    05bab447fa3830b407e8a8a4e7a2d54185bce7ec

    SHA256

    8c851e28c947210effb59740d04ead4a76178027e71cbf0ca24a15c0a5c84104

    SHA512

    b3daf833c6a68c75f5049462efa228e2a2b4d98d86044ee6a3b3ca1df1614f9044afd274f1d31428590c49f49cee68d3a9ad7edae76eaada9eabff5db7e00e9d

  • memory/1356-54-0x0000000075BA1000-0x0000000075BA3000-memory.dmp

    Filesize

    8KB

  • memory/1356-58-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/1756-56-0x0000000000000000-mapping.dmp

  • memory/1756-61-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB