Analysis

  • max time kernel
    99s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 23:43

General

  • Target

    9c78e2b53d79f4ea0d694adc1ea31c352dc3c79ff0ceac865f62036ca9e6b8d0.exe

  • Size

    839KB

  • MD5

    4c68e3236c9035af979437d1647fb190

  • SHA1

    6278578a2235775a5e5ab39e4ea649b32a047d3a

  • SHA256

    9c78e2b53d79f4ea0d694adc1ea31c352dc3c79ff0ceac865f62036ca9e6b8d0

  • SHA512

    65e6cb98740def433c89c361adee8a9e8b508b6a89f4b0d20e5769d09bc7cba3c1710ff96e8bc3fdd27c646c91b164c1ba220939a7f5e6c732fa33cdbc53c8cc

  • SSDEEP

    24576:aUpkSNZ+5UnQtTN8FGIaScYQqSAOEBAtSdcENAOmgJ:aUiPkspdYIqSAOECLE2OmgJ

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 21 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c78e2b53d79f4ea0d694adc1ea31c352dc3c79ff0ceac865f62036ca9e6b8d0.exe
    "C:\Users\Admin\AppData\Local\Temp\9c78e2b53d79f4ea0d694adc1ea31c352dc3c79ff0ceac865f62036ca9e6b8d0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_ms0825.bat" "C:\Users\Admin\AppData\Local\Temp\9c78e2b53d79f4ea0d694adc1ea31c352dc3c79ff0ceac865f62036ca9e6b8d0.exe""
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Users\Admin\AppData\Local\Temp\9c78e2b53d79f4ea0d694adc1ea31c352dc3c79ff0ceac865f62036ca9e6b8d0.exe
        "C:\Users\Admin\AppData\Local\Temp\9c78e2b53d79f4ea0d694adc1ea31c352dc3c79ff0ceac865f62036ca9e6b8d0.exe"
        3⤵
        • Executes dropped EXE
        PID:964
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      C:\Users\Admin\AppData\Local\Temp\file.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\4592.dll",ADB_Release
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Modifies system certificate store
        PID:1664
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\6F8F.bat" "
        3⤵
          PID:1616

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\4592.dll

            Filesize

            123KB

            MD5

            c8eb6040fd02d77660d19057a38ff769

            SHA1

            b491c14d8cfb48636f6095b7b16555e9a575d57f

            SHA256

            366affd094cc63e2c19c5d57a6866b487889dab5d1b07c084fff94262d8a390b

            SHA512

            36d8bc7f18bbb62cfaf012a1e0539301d7eb1104b2f3bd79025f72e2a8f688e8d2b20f229253f8d387e25cb67f60e4306b6dab2b7e054f439c1a750bec896e56

          • C:\Users\Admin\AppData\Local\Temp\6F8F.bat

            Filesize

            139B

            MD5

            863f0baf37283b3ec8accb192a11269f

            SHA1

            458f9e5c8dc8271d5f0a6790d42872d8bbc1279b

            SHA256

            61c834413f719a91f215733d32f21c1ce9f4ab8acb6409d9aedbfaca8671fb24

            SHA512

            caeebdbfa3d3575f867d07055cd057d35c8076b03ea72d6a8cdcca44d599d110715114f589417a3773a643456a933be6938bced67eacdc243a933684ef6c94ba

          • C:\Users\Admin\AppData\Local\Temp\9c78e2b53d79f4ea0d694adc1ea31c352dc3c79ff0ceac865f62036ca9e6b8d0.exe

            Filesize

            617KB

            MD5

            15c49ab625fe6a067cedf58edcf733b6

            SHA1

            f0728e618dd7a3605d442aece0a784ca729cf2ee

            SHA256

            eaf01b8e1ea4d6d069767e8e5ff40ffb18ccbf45337b4b6f7edab9851de64eba

            SHA512

            b5187a0dcc0c0844029b21ce4fd4a97aaf1ea9ed8d270427072cc379a5dd97cec285e52b8d6970b25681c2b7f9765dcc9a67180706060d119b4884e4b00502e7

          • C:\Users\Admin\AppData\Local\Temp\9c78e2b53d79f4ea0d694adc1ea31c352dc3c79ff0ceac865f62036ca9e6b8d0.exe

            Filesize

            617KB

            MD5

            15c49ab625fe6a067cedf58edcf733b6

            SHA1

            f0728e618dd7a3605d442aece0a784ca729cf2ee

            SHA256

            eaf01b8e1ea4d6d069767e8e5ff40ffb18ccbf45337b4b6f7edab9851de64eba

            SHA512

            b5187a0dcc0c0844029b21ce4fd4a97aaf1ea9ed8d270427072cc379a5dd97cec285e52b8d6970b25681c2b7f9765dcc9a67180706060d119b4884e4b00502e7

          • C:\Users\Admin\AppData\Local\Temp\Chronotron3_5.exe.org

            Filesize

            617KB

            MD5

            15c49ab625fe6a067cedf58edcf733b6

            SHA1

            f0728e618dd7a3605d442aece0a784ca729cf2ee

            SHA256

            eaf01b8e1ea4d6d069767e8e5ff40ffb18ccbf45337b4b6f7edab9851de64eba

            SHA512

            b5187a0dcc0c0844029b21ce4fd4a97aaf1ea9ed8d270427072cc379a5dd97cec285e52b8d6970b25681c2b7f9765dcc9a67180706060d119b4884e4b00502e7

          • C:\Users\Admin\AppData\Local\Temp\_ms0825.bat

            Filesize

            234B

            MD5

            55db6cc0cefe76502ebb2c8de5015bc1

            SHA1

            53b058e06f21f0e34ca5fba00e9eeb0f895ab543

            SHA256

            f702b6e7c3729a037c1788d831d8f7d0677229a498ad3a94bde929f9b6f4c8da

            SHA512

            659ab9d912420ace6973b678dca1405cf649ee24bb397c2d50ef47a082b014917e6ec2cc4cb244790f67402975bf59bbef000e29c5ea286d3d6ed6678c8cd662

          • C:\Users\Admin\AppData\Local\Temp\file.exe

            Filesize

            214KB

            MD5

            28f96a57fa5ff663926e9bad51a1d0cb

            SHA1

            a75995f94854dea8799650a2f4a97980b71199d2

            SHA256

            19972cc87c7653aff9620461ce459b996b1f9b030d7c8031df0c8265b73f670d

            SHA512

            104a8be2c460f73ac953711f677c8666b5831bebd64ec01b722c14270f4ceaef1f3564b00006f47bb25c42f67137d746b72be57e3d2bcb9bd98908784ef3339b

          • C:\Users\Admin\AppData\Local\Temp\file.exe

            Filesize

            214KB

            MD5

            28f96a57fa5ff663926e9bad51a1d0cb

            SHA1

            a75995f94854dea8799650a2f4a97980b71199d2

            SHA256

            19972cc87c7653aff9620461ce459b996b1f9b030d7c8031df0c8265b73f670d

            SHA512

            104a8be2c460f73ac953711f677c8666b5831bebd64ec01b722c14270f4ceaef1f3564b00006f47bb25c42f67137d746b72be57e3d2bcb9bd98908784ef3339b

          • \Users\Admin\AppData\Local\Temp\4592.dll

            Filesize

            123KB

            MD5

            c8eb6040fd02d77660d19057a38ff769

            SHA1

            b491c14d8cfb48636f6095b7b16555e9a575d57f

            SHA256

            366affd094cc63e2c19c5d57a6866b487889dab5d1b07c084fff94262d8a390b

            SHA512

            36d8bc7f18bbb62cfaf012a1e0539301d7eb1104b2f3bd79025f72e2a8f688e8d2b20f229253f8d387e25cb67f60e4306b6dab2b7e054f439c1a750bec896e56

          • \Users\Admin\AppData\Local\Temp\4592.dll

            Filesize

            123KB

            MD5

            c8eb6040fd02d77660d19057a38ff769

            SHA1

            b491c14d8cfb48636f6095b7b16555e9a575d57f

            SHA256

            366affd094cc63e2c19c5d57a6866b487889dab5d1b07c084fff94262d8a390b

            SHA512

            36d8bc7f18bbb62cfaf012a1e0539301d7eb1104b2f3bd79025f72e2a8f688e8d2b20f229253f8d387e25cb67f60e4306b6dab2b7e054f439c1a750bec896e56

          • \Users\Admin\AppData\Local\Temp\4592.dll

            Filesize

            123KB

            MD5

            c8eb6040fd02d77660d19057a38ff769

            SHA1

            b491c14d8cfb48636f6095b7b16555e9a575d57f

            SHA256

            366affd094cc63e2c19c5d57a6866b487889dab5d1b07c084fff94262d8a390b

            SHA512

            36d8bc7f18bbb62cfaf012a1e0539301d7eb1104b2f3bd79025f72e2a8f688e8d2b20f229253f8d387e25cb67f60e4306b6dab2b7e054f439c1a750bec896e56

          • \Users\Admin\AppData\Local\Temp\4592.dll

            Filesize

            123KB

            MD5

            c8eb6040fd02d77660d19057a38ff769

            SHA1

            b491c14d8cfb48636f6095b7b16555e9a575d57f

            SHA256

            366affd094cc63e2c19c5d57a6866b487889dab5d1b07c084fff94262d8a390b

            SHA512

            36d8bc7f18bbb62cfaf012a1e0539301d7eb1104b2f3bd79025f72e2a8f688e8d2b20f229253f8d387e25cb67f60e4306b6dab2b7e054f439c1a750bec896e56

          • \Users\Admin\AppData\Local\Temp\9c78e2b53d79f4ea0d694adc1ea31c352dc3c79ff0ceac865f62036ca9e6b8d0.exe

            Filesize

            617KB

            MD5

            15c49ab625fe6a067cedf58edcf733b6

            SHA1

            f0728e618dd7a3605d442aece0a784ca729cf2ee

            SHA256

            eaf01b8e1ea4d6d069767e8e5ff40ffb18ccbf45337b4b6f7edab9851de64eba

            SHA512

            b5187a0dcc0c0844029b21ce4fd4a97aaf1ea9ed8d270427072cc379a5dd97cec285e52b8d6970b25681c2b7f9765dcc9a67180706060d119b4884e4b00502e7

          • \Users\Admin\AppData\Local\Temp\file.exe

            Filesize

            214KB

            MD5

            28f96a57fa5ff663926e9bad51a1d0cb

            SHA1

            a75995f94854dea8799650a2f4a97980b71199d2

            SHA256

            19972cc87c7653aff9620461ce459b996b1f9b030d7c8031df0c8265b73f670d

            SHA512

            104a8be2c460f73ac953711f677c8666b5831bebd64ec01b722c14270f4ceaef1f3564b00006f47bb25c42f67137d746b72be57e3d2bcb9bd98908784ef3339b

          • \Users\Admin\AppData\Local\Temp\file.exe

            Filesize

            214KB

            MD5

            28f96a57fa5ff663926e9bad51a1d0cb

            SHA1

            a75995f94854dea8799650a2f4a97980b71199d2

            SHA256

            19972cc87c7653aff9620461ce459b996b1f9b030d7c8031df0c8265b73f670d

            SHA512

            104a8be2c460f73ac953711f677c8666b5831bebd64ec01b722c14270f4ceaef1f3564b00006f47bb25c42f67137d746b72be57e3d2bcb9bd98908784ef3339b

          • memory/1224-54-0x0000000076041000-0x0000000076043000-memory.dmp

            Filesize

            8KB