Analysis

  • max time kernel
    47s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2022, 03:43

General

  • Target

    9ebae2e12069e55f663ab3e045cf6305058ab4e8a3debe602a275b48f05d2d12.exe

  • Size

    1.7MB

  • MD5

    2967931eab546834ce91e270724348dc

  • SHA1

    d00ebca9e44e19d56afa72f42acd475ad59ba33f

  • SHA256

    9ebae2e12069e55f663ab3e045cf6305058ab4e8a3debe602a275b48f05d2d12

  • SHA512

    79ab094e1984e64c62df7b3fca536f40720e44ee742761cb8ec91f497e05c8675718008f1af096c3a311d5a535e3293f53b413512f6dba6f95d4f6085b25a936

  • SSDEEP

    49152:4unGBJta0Slsp0TccLVPjFasQ2SejqE+Uz1B:4KGBJqS2TceJhaskUz1B

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ebae2e12069e55f663ab3e045cf6305058ab4e8a3debe602a275b48f05d2d12.exe
    "C:\Users\Admin\AppData\Local\Temp\9ebae2e12069e55f663ab3e045cf6305058ab4e8a3debe602a275b48f05d2d12.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" .\ORB7qov.BI -U -S
      2⤵
      • Loads dropped DLL
      PID:1676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ORB7qov.BI

    Filesize

    1.7MB

    MD5

    a9d91c5c320f515793506a7b1dc8b63a

    SHA1

    2d7dcc156541f9b39eacd12fdae7010ed280d51f

    SHA256

    e288d2abd42a105cc6cd02a3bde35fcb55e67d851935c88ebf34ef0f6b63a1a2

    SHA512

    0054d1cd7238b8ba4350cc9cb5791f553d1c684b8fef8dac39b6e570ef5f1daa7b56e8a110c2514777aa00a7cc80be84f2db4acbe0fddd7420d1b42f4b845891

  • \Users\Admin\AppData\Local\Temp\ORB7qov.bI

    Filesize

    1.7MB

    MD5

    a9d91c5c320f515793506a7b1dc8b63a

    SHA1

    2d7dcc156541f9b39eacd12fdae7010ed280d51f

    SHA256

    e288d2abd42a105cc6cd02a3bde35fcb55e67d851935c88ebf34ef0f6b63a1a2

    SHA512

    0054d1cd7238b8ba4350cc9cb5791f553d1c684b8fef8dac39b6e570ef5f1daa7b56e8a110c2514777aa00a7cc80be84f2db4acbe0fddd7420d1b42f4b845891

  • memory/1456-54-0x0000000075C81000-0x0000000075C83000-memory.dmp

    Filesize

    8KB

  • memory/1676-59-0x0000000000A20000-0x0000000000BE3000-memory.dmp

    Filesize

    1.8MB

  • memory/1676-61-0x00000000024B0000-0x00000000025C2000-memory.dmp

    Filesize

    1.1MB

  • memory/1676-60-0x0000000002370000-0x00000000024A8000-memory.dmp

    Filesize

    1.2MB

  • memory/1676-62-0x00000000025D0000-0x000000000269B000-memory.dmp

    Filesize

    812KB

  • memory/1676-63-0x00000000026A0000-0x0000000002757000-memory.dmp

    Filesize

    732KB

  • memory/1676-66-0x00000000024B0000-0x00000000025C2000-memory.dmp

    Filesize

    1.1MB