Analysis

  • max time kernel
    47s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 06:01

General

  • Target

    474945f24bf24c0574a9cd452597232e6bc16816f2fe89509aea56a33df7dc21.exe

  • Size

    213KB

  • MD5

    09759ddfd7166609b215fb71f6a48c31

  • SHA1

    e404b921f89d05c8c23e7d9548e3c3675ab97750

  • SHA256

    474945f24bf24c0574a9cd452597232e6bc16816f2fe89509aea56a33df7dc21

  • SHA512

    854391c2b4db9d9af1f279206e0dbd83c215c9254dd3d903cf657c32e7d4dfc853d6490f3a630796a29d59dd7463aa7c1ed85ba238dbb29bbef098af868f5c7b

  • SSDEEP

    3072:pW7W7yG7YLiHUpf4eOJ2rtBZamwhh1Qv4A3YMgd93fWGW8c7JgnVH9hMsnQ:M7MN9mfRNromkTgsM6vji7JuDM1

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\474945f24bf24c0574a9cd452597232e6bc16816f2fe89509aea56a33df7dc21.exe
    "C:\Users\Admin\AppData\Local\Temp\474945f24bf24c0574a9cd452597232e6bc16816f2fe89509aea56a33df7dc21.exe"
    1⤵
    • Loads dropped DLL
    PID:1380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsy1374.tmp\System.dll

    Filesize

    10KB

    MD5

    9b40e5625f6f893a141f4df48ac0838f

    SHA1

    97dcc3c09f441129d293629a0f0d8d64e56a172d

    SHA256

    1b2e5f2e29366accc88c4d0a2127f986769d4ccb585621314647374afb518099

    SHA512

    1d4ba3af8d0a827f4c313fb7c89de1132729f0f6bd8846ea14e5d272dbe5283b12fc3b51b49139fbbad775727e4f1a1a9a5aab40ea401f5fe300235d7cc8b3e7

  • \Users\Admin\AppData\Local\Temp\nsy1374.tmp\nsDialogs.dll

    Filesize

    8KB

    MD5

    6308421518c3b18018c223ba7a375a07

    SHA1

    1a8acf808b7172ae861da3d132479f31145958eb

    SHA256

    b79aa0bbad073cba2bb8fe9555618966c9231e45b8f5ff8f535e8b5498733fb3

    SHA512

    c08ec072ce156cd68bf7e2abf31f5cfaefdd972cdccd7f3e2c7854ab50f1dce4344b116250c8ef3ed6419ce264b2af0e1b03f9208febcc4b042faa20b95c7967

  • memory/1380-54-0x00000000757A1000-0x00000000757A3000-memory.dmp

    Filesize

    8KB