Analysis

  • max time kernel
    144s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 21:17

General

  • Target

    26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe

  • Size

    1.3MB

  • MD5

    aa565f2b01389e5c4d885dfeffde711a

  • SHA1

    b29fc7ec174403f8ae24030be75aefc4e5ae2261

  • SHA256

    26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d

  • SHA512

    63cca4bf6bbf3060a27aa8dd9362cc1485b42df1ff65f5b9793ceea68b24a7ec68048f9651e99fbbd026072d7eff898f021d035848f9f5e4b2113a9c2f50bac5

  • SSDEEP

    24576:bow4tqllwDrC518o0jsCKABZ+0A8H3pWFEvr0nfun:bo1tHC56RZKkEIH3QEvr

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe
    "C:\Users\Admin\AppData\Local\Temp\26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\ProgramData\MKJ3LZ4\8Z3G6Y747.exe
      "C:\ProgramData\MKJ3LZ4\8Z3G6Y747.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:980
      • C:\Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\2N9134M9X74TR9OO.exe
        433A5C50726F6772616D446174615C4D4B4A334C5A345C385A334736593734372E657865
        3⤵
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\5850FW55K6.exe
          433A5C50726F6772616D446174615C4D4B4A334C5A345C385A334736593734372E657865
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1140

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\MKJ3LZ4\8Z3G6Y747.data

    Filesize

    158B

    MD5

    1ae2151ef56e383ca2800a0d05fc2c72

    SHA1

    d6b284d32b8d3a7051472d4ed807dd258f4893bf

    SHA256

    dbf690f30689770bddfa4f383a79d82e08d55a080ace8590ab2ef4b970055d37

    SHA512

    3d279e12c8738d1716cdaf18c9bd8980e8cb4982279a209966aeedba593582ad523305c6d14f464c7ef8283fa4e905884dea1b385bda6cafcb2efd7b9ef5bf3a

  • C:\ProgramData\MKJ3LZ4\8Z3G6Y747.data

    Filesize

    246B

    MD5

    e7eb432528a6bda753423018d2f3cc50

    SHA1

    b77e031c3e3041b82e6c59a22ca356fd61da59f1

    SHA256

    5c72f4e124742f985530886dac1f50ed35cb973d616daea8c6dec0f4d91cbae9

    SHA512

    d85197161cc37fcfd9d4c4cb477b269afeeed1240ee6e9d293804816c6cfce9a444cc3de31534e79be5aeddab399fb8370d88d6bb71bd182ee59fc4322dd1705

  • C:\ProgramData\MKJ3LZ4\8Z3G6Y747.exe

    Filesize

    167KB

    MD5

    54a010c60be10b65eee5506720fccabb

    SHA1

    18cfa274db7d6567441db036eb2b25b720d58884

    SHA256

    9a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89

    SHA512

    afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae

  • C:\ProgramData\MKJ3LZ4\8Z3G6Y747.exe

    Filesize

    167KB

    MD5

    54a010c60be10b65eee5506720fccabb

    SHA1

    18cfa274db7d6567441db036eb2b25b720d58884

    SHA256

    9a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89

    SHA512

    afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae

  • C:\ProgramData\MKJ3LZ4\goopdate.dll

    Filesize

    400KB

    MD5

    7f05f4d964cb2dd542d181ed5cfe17ca

    SHA1

    0c42c53f2af0425454b92aa06eb60107cdfe2bc5

    SHA256

    8b3ed5818437f7ff5e1b18341849853ef345432ea3c8f9ce3d7587ad1674c1bc

    SHA512

    b110e75abe457848a513cc09f7ea0a00ee8f41c3584ec042e12b74421c8aa0aefba3d8b69dbf0bb2d80272f444183902ab66af2abbdade287a3f0ecde86ecac3

  • C:\Users\Admin\AppData\Local\078BFBFF000306D2

    Filesize

    116B

    MD5

    9e600b1de6d8006995bef537c076674b

    SHA1

    afa7a42186096d1b4833e2ed045bb5faf216ef86

    SHA256

    43581b497508e6cdfe2e4da3bfeaf7b693281361e828863baf4365ff5015b8c1

    SHA512

    c4f08c0e704fc4b844b0110854a7316415317108d5987bce5f92ca28a3476eb7e6ccc9e58344de739c6a631cd34974311a1cbd76227bd8acbb195431032e55f6

  • C:\Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\2N9134M9X74TR9OO.data

    Filesize

    158B

    MD5

    1ae2151ef56e383ca2800a0d05fc2c72

    SHA1

    d6b284d32b8d3a7051472d4ed807dd258f4893bf

    SHA256

    dbf690f30689770bddfa4f383a79d82e08d55a080ace8590ab2ef4b970055d37

    SHA512

    3d279e12c8738d1716cdaf18c9bd8980e8cb4982279a209966aeedba593582ad523305c6d14f464c7ef8283fa4e905884dea1b385bda6cafcb2efd7b9ef5bf3a

  • C:\Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\2N9134M9X74TR9OO.exe

    Filesize

    167KB

    MD5

    54a010c60be10b65eee5506720fccabb

    SHA1

    18cfa274db7d6567441db036eb2b25b720d58884

    SHA256

    9a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89

    SHA512

    afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae

  • C:\Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\2N9134M9X74TR9OO.exe

    Filesize

    167KB

    MD5

    54a010c60be10b65eee5506720fccabb

    SHA1

    18cfa274db7d6567441db036eb2b25b720d58884

    SHA256

    9a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89

    SHA512

    afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae

  • C:\Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\5850FW55K6.data

    Filesize

    246B

    MD5

    e7eb432528a6bda753423018d2f3cc50

    SHA1

    b77e031c3e3041b82e6c59a22ca356fd61da59f1

    SHA256

    5c72f4e124742f985530886dac1f50ed35cb973d616daea8c6dec0f4d91cbae9

    SHA512

    d85197161cc37fcfd9d4c4cb477b269afeeed1240ee6e9d293804816c6cfce9a444cc3de31534e79be5aeddab399fb8370d88d6bb71bd182ee59fc4322dd1705

  • C:\Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\5850FW55K6.exe

    Filesize

    167KB

    MD5

    54a010c60be10b65eee5506720fccabb

    SHA1

    18cfa274db7d6567441db036eb2b25b720d58884

    SHA256

    9a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89

    SHA512

    afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae

  • C:\Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\5850FW55K6.exe

    Filesize

    167KB

    MD5

    54a010c60be10b65eee5506720fccabb

    SHA1

    18cfa274db7d6567441db036eb2b25b720d58884

    SHA256

    9a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89

    SHA512

    afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae

  • C:\Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\goopdate.dll

    Filesize

    400KB

    MD5

    7f05f4d964cb2dd542d181ed5cfe17ca

    SHA1

    0c42c53f2af0425454b92aa06eb60107cdfe2bc5

    SHA256

    8b3ed5818437f7ff5e1b18341849853ef345432ea3c8f9ce3d7587ad1674c1bc

    SHA512

    b110e75abe457848a513cc09f7ea0a00ee8f41c3584ec042e12b74421c8aa0aefba3d8b69dbf0bb2d80272f444183902ab66af2abbdade287a3f0ecde86ecac3

  • \ProgramData\MKJ3LZ4\8Z3G6Y747.exe

    Filesize

    167KB

    MD5

    54a010c60be10b65eee5506720fccabb

    SHA1

    18cfa274db7d6567441db036eb2b25b720d58884

    SHA256

    9a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89

    SHA512

    afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae

  • \ProgramData\MKJ3LZ4\goopdate.dll

    Filesize

    400KB

    MD5

    7f05f4d964cb2dd542d181ed5cfe17ca

    SHA1

    0c42c53f2af0425454b92aa06eb60107cdfe2bc5

    SHA256

    8b3ed5818437f7ff5e1b18341849853ef345432ea3c8f9ce3d7587ad1674c1bc

    SHA512

    b110e75abe457848a513cc09f7ea0a00ee8f41c3584ec042e12b74421c8aa0aefba3d8b69dbf0bb2d80272f444183902ab66af2abbdade287a3f0ecde86ecac3

  • \Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\2N9134M9X74TR9OO.exe

    Filesize

    167KB

    MD5

    54a010c60be10b65eee5506720fccabb

    SHA1

    18cfa274db7d6567441db036eb2b25b720d58884

    SHA256

    9a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89

    SHA512

    afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae

  • \Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\5850FW55K6.exe

    Filesize

    167KB

    MD5

    54a010c60be10b65eee5506720fccabb

    SHA1

    18cfa274db7d6567441db036eb2b25b720d58884

    SHA256

    9a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89

    SHA512

    afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae

  • \Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\goopdate.dll

    Filesize

    400KB

    MD5

    7f05f4d964cb2dd542d181ed5cfe17ca

    SHA1

    0c42c53f2af0425454b92aa06eb60107cdfe2bc5

    SHA256

    8b3ed5818437f7ff5e1b18341849853ef345432ea3c8f9ce3d7587ad1674c1bc

    SHA512

    b110e75abe457848a513cc09f7ea0a00ee8f41c3584ec042e12b74421c8aa0aefba3d8b69dbf0bb2d80272f444183902ab66af2abbdade287a3f0ecde86ecac3

  • \Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\goopdate.dll

    Filesize

    400KB

    MD5

    7f05f4d964cb2dd542d181ed5cfe17ca

    SHA1

    0c42c53f2af0425454b92aa06eb60107cdfe2bc5

    SHA256

    8b3ed5818437f7ff5e1b18341849853ef345432ea3c8f9ce3d7587ad1674c1bc

    SHA512

    b110e75abe457848a513cc09f7ea0a00ee8f41c3584ec042e12b74421c8aa0aefba3d8b69dbf0bb2d80272f444183902ab66af2abbdade287a3f0ecde86ecac3

  • memory/980-71-0x00000000043B0000-0x000000000451B000-memory.dmp

    Filesize

    1.4MB

  • memory/980-67-0x0000000003C00000-0x0000000003CF1000-memory.dmp

    Filesize

    964KB

  • memory/980-76-0x0000000003C00000-0x0000000003CF1000-memory.dmp

    Filesize

    964KB

  • memory/980-77-0x0000000004080000-0x000000000419B000-memory.dmp

    Filesize

    1.1MB

  • memory/980-74-0x00000000043B0000-0x000000000451B000-memory.dmp

    Filesize

    1.4MB

  • memory/980-73-0x0000000002EF0000-0x0000000002FDA000-memory.dmp

    Filesize

    936KB

  • memory/980-72-0x0000000004080000-0x000000000419B000-memory.dmp

    Filesize

    1.1MB

  • memory/980-75-0x0000000002360000-0x00000000023B2000-memory.dmp

    Filesize

    328KB

  • memory/980-61-0x0000000001E60000-0x0000000001F4C000-memory.dmp

    Filesize

    944KB

  • memory/980-70-0x0000000003820000-0x0000000003AFC000-memory.dmp

    Filesize

    2.9MB

  • memory/980-63-0x0000000001E60000-0x0000000001F4C000-memory.dmp

    Filesize

    944KB

  • memory/980-87-0x0000000003820000-0x0000000003AFC000-memory.dmp

    Filesize

    2.9MB

  • memory/980-64-0x0000000003820000-0x0000000003AFC000-memory.dmp

    Filesize

    2.9MB

  • memory/980-69-0x0000000003C00000-0x0000000003CF1000-memory.dmp

    Filesize

    964KB

  • memory/980-65-0x0000000003820000-0x0000000003AFC000-memory.dmp

    Filesize

    2.9MB

  • memory/980-68-0x00000000022B0000-0x0000000002313000-memory.dmp

    Filesize

    396KB

  • memory/1140-110-0x0000000003790000-0x0000000003A6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1140-107-0x0000000001E20000-0x0000000001F0C000-memory.dmp

    Filesize

    944KB

  • memory/1140-121-0x0000000003790000-0x0000000003A6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1140-120-0x0000000002DA0000-0x0000000002DF2000-memory.dmp

    Filesize

    328KB

  • memory/1140-119-0x0000000004450000-0x00000000045BB000-memory.dmp

    Filesize

    1.4MB

  • memory/1140-118-0x0000000003420000-0x00000000034C0000-memory.dmp

    Filesize

    640KB

  • memory/1140-117-0x0000000004120000-0x000000000423B000-memory.dmp

    Filesize

    1.1MB

  • memory/1140-116-0x0000000003EB0000-0x0000000003FA1000-memory.dmp

    Filesize

    964KB

  • memory/1140-115-0x0000000004450000-0x00000000045BB000-memory.dmp

    Filesize

    1.4MB

  • memory/1140-114-0x0000000002040000-0x00000000020A3000-memory.dmp

    Filesize

    396KB

  • memory/1140-112-0x0000000003EB0000-0x0000000003FA1000-memory.dmp

    Filesize

    964KB

  • memory/1140-111-0x0000000003790000-0x0000000003A6C000-memory.dmp

    Filesize

    2.9MB

  • memory/1140-109-0x0000000001E20000-0x0000000001F0C000-memory.dmp

    Filesize

    944KB

  • memory/1460-100-0x0000000002530000-0x0000000002582000-memory.dmp

    Filesize

    328KB

  • memory/1460-101-0x00000000036F0000-0x00000000039CC000-memory.dmp

    Filesize

    2.9MB

  • memory/1460-86-0x0000000000390000-0x000000000047C000-memory.dmp

    Filesize

    944KB

  • memory/1460-94-0x00000000042B0000-0x000000000441B000-memory.dmp

    Filesize

    1.4MB

  • memory/1460-88-0x00000000036F0000-0x00000000039CC000-memory.dmp

    Filesize

    2.9MB

  • memory/1460-90-0x00000000036F0000-0x00000000039CC000-memory.dmp

    Filesize

    2.9MB

  • memory/1460-84-0x0000000000390000-0x000000000047C000-memory.dmp

    Filesize

    944KB

  • memory/1460-92-0x0000000003D80000-0x0000000003E71000-memory.dmp

    Filesize

    964KB

  • memory/1460-99-0x00000000042B0000-0x000000000441B000-memory.dmp

    Filesize

    1.4MB

  • memory/1460-98-0x00000000040A0000-0x000000000418A000-memory.dmp

    Filesize

    936KB

  • memory/1460-97-0x0000000003F80000-0x000000000409B000-memory.dmp

    Filesize

    1.1MB

  • memory/1460-96-0x0000000003D80000-0x0000000003E71000-memory.dmp

    Filesize

    964KB

  • memory/1460-95-0x0000000002760000-0x00000000027C3000-memory.dmp

    Filesize

    396KB

  • memory/1644-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

    Filesize

    8KB