Resubmissions

07/11/2022, 04:13

221107-etfnmagbf3 8

07/11/2022, 03:52

221107-ee4rxafee9 8

Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 03:52

General

  • Target

    f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe

  • Size

    5.8MB

  • MD5

    cc65b782891a1607c75a02a45482a4de

  • SHA1

    e3e7083777d011b630efc2fcec2c1b159ec0f6f3

  • SHA256

    f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0

  • SHA512

    cea23129a8eca0a43b557196b2c0a9f39453658174d7e9badce6997222f58d031e23a4163766de95a171f8fe0c8d71716d4b9941481167a1acd9954330571b39

  • SSDEEP

    98304:v/LU6G3sLQ2LCX4fGc2glR3jIgJqHrk9ZO0QG6aoNW3ZTWDtNy08I+KW2:vDOIfzNjIgsHrX0Z6tkpC+08ILW2

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe
    "C:\Users\Admin\AppData\Local\Temp\f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /CREATE /TN "Windows\IntelComputingToolkit\IntelGAS4.8.8.8." /TR "C:\ProgramData\InteIToolSkits\IntelGAS-Ver4.8.8.8.exe" /SC MINUTE
      2⤵
      • Creates scheduled task(s)
      PID:1520
    • C:\Windows\SysWOW64\icacls.exe
      "C:\Windows\System32\icacls.exe" "C:\ProgramData\InteIToolSkits" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
      2⤵
      • Modifies file permissions
      PID:628
    • C:\Windows\SysWOW64\icacls.exe
      "C:\Windows\System32\icacls.exe" "C:\ProgramData\InteIToolSkits" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
      2⤵
      • Modifies file permissions
      PID:2028
    • C:\Windows\SysWOW64\icacls.exe
      "C:\Windows\System32\icacls.exe" "C:\ProgramData\InteIToolSkits" /inheritance:e /deny "adMnepoxyFEYWGOLmin:(R,REA,RA,RD)"
      2⤵
      • Modifies file permissions
      PID:1692
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {FB2D0CC0-54C5-4E3A-B765-1B5BC438F269} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\ProgramData\InteIToolSkits\IntelGAS-Ver4.8.8.8.exe
      C:\ProgramData\InteIToolSkits\IntelGAS-Ver4.8.8.8.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1608

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\InteIToolSkits\IntelGAS-Ver4.8.8.8.exe

          Filesize

          1015.2MB

          MD5

          89d8fe27b81fb9ec734360152003af53

          SHA1

          b407e26d213e5b46e7291ca61d9e5d5fa73c7f4f

          SHA256

          5dc52dc90707ee6f08bb98f4b4566f20a5565a4bfb1d12ab059ae8db7dda3a6f

          SHA512

          7fbfd6e8519b4375975403c6fd76f88993702f8eff81d6508235474fdfdaccbb552ba4bbab7fd6bd67bcded0d3234d541731333d61bcd7490c480865f6aa22ca

        • C:\ProgramData\InteIToolSkits\IntelGAS-Ver4.8.8.8.exe

          Filesize

          1015.2MB

          MD5

          89d8fe27b81fb9ec734360152003af53

          SHA1

          b407e26d213e5b46e7291ca61d9e5d5fa73c7f4f

          SHA256

          5dc52dc90707ee6f08bb98f4b4566f20a5565a4bfb1d12ab059ae8db7dda3a6f

          SHA512

          7fbfd6e8519b4375975403c6fd76f88993702f8eff81d6508235474fdfdaccbb552ba4bbab7fd6bd67bcded0d3234d541731333d61bcd7490c480865f6aa22ca

        • memory/1212-65-0x0000000000400000-0x0000000000D41000-memory.dmp

          Filesize

          9.3MB

        • memory/1212-55-0x0000000000400000-0x0000000000D41000-memory.dmp

          Filesize

          9.3MB

        • memory/1212-58-0x0000000000400000-0x0000000000D41000-memory.dmp

          Filesize

          9.3MB

        • memory/1212-54-0x0000000075E11000-0x0000000075E13000-memory.dmp

          Filesize

          8KB

        • memory/1212-63-0x0000000000400000-0x0000000000D41000-memory.dmp

          Filesize

          9.3MB

        • memory/1608-69-0x0000000000400000-0x0000000000D41000-memory.dmp

          Filesize

          9.3MB

        • memory/1608-72-0x0000000000400000-0x0000000000D41000-memory.dmp

          Filesize

          9.3MB