Analysis

  • max time kernel
    150s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 23:02

General

  • Target

    90fdc654c66fefb7943e311406bd8fc3fda93894afb4166cf3514d832cdd9f13.exe

  • Size

    85KB

  • MD5

    f2d06659cb00a8aa51151269052f7062

  • SHA1

    7eba5519e2023762b49f03c9b862a2f99675029a

  • SHA256

    90fdc654c66fefb7943e311406bd8fc3fda93894afb4166cf3514d832cdd9f13

  • SHA512

    42da41fcbfb63e7f084b08b3c277ce429fe932730763e231a732096914da7f60306dc1b2d74a45aaabede77c3211de950a2064251ee2fd24e3aa5338cdac7799

  • SSDEEP

    1536:x4UHxpN/MUXsLTvCj0DBXJaOm/IykWj4EmzNhJAKww0tk2d2JUxZq:x4URpNUUX6z/DBXJfmwykWfS5wXtf2yy

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90fdc654c66fefb7943e311406bd8fc3fda93894afb4166cf3514d832cdd9f13.exe
    "C:\Users\Admin\AppData\Local\Temp\90fdc654c66fefb7943e311406bd8fc3fda93894afb4166cf3514d832cdd9f13.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\AppData\Local\Temp\90fdc654c66fefb7943e311406bd8fc3fda93894afb4166cf3514d832cdd9f13.exe
      "C:\Users\Admin\AppData\Local\Temp\90fdc654c66fefb7943e311406bd8fc3fda93894afb4166cf3514d832cdd9f13.exe"
      2⤵
      • Maps connected drives based on registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Windows\syswow64\svchost.exe
        C:\Windows\syswow64\svchost.exe
        3⤵
        • Adds policy Run key to start application
        • Deletes itself
        • Drops file in Program Files directory
        PID:688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nseC709.tmp\conferment.dll

    Filesize

    58KB

    MD5

    6f36d3b6f90eda16d5f2bc2c55d14b87

    SHA1

    c60cf4b58256c2a2526e6acd2994f225928dc7da

    SHA256

    bdcea21d95ff30fb5a1067e0466086b5b6fc930e24e52790d62ab59aeab9159a

    SHA512

    414ba19935cd00233001aeb7797c5f592a77ee9c9ca5e84652bf304af88d9adf8d22707a7a2a1f899ff2c83d75945cf7e4a584cbeece588a1e2748de62a630ae

  • memory/688-62-0x0000000000000000-mapping.dmp

  • memory/688-63-0x0000000000630000-0x0000000000638000-memory.dmp

    Filesize

    32KB

  • memory/688-64-0x0000000000020000-0x0000000000025000-memory.dmp

    Filesize

    20KB

  • memory/688-65-0x0000000000020000-0x0000000000025000-memory.dmp

    Filesize

    20KB

  • memory/1716-57-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/1716-58-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/1716-61-0x000000000040141C-mapping.dmp

  • memory/1716-60-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/1772-54-0x0000000075291000-0x0000000075293000-memory.dmp

    Filesize

    8KB

  • memory/1772-56-0x0000000001F10000-0x0000000001F27000-memory.dmp

    Filesize

    92KB