Analysis

  • max time kernel
    145s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:01

General

  • Target

    4ff1452566fc312f9630c1fa2a2250a665e1ec3602b7168e4240306b114eae84.exe

  • Size

    22KB

  • MD5

    a9c2bc397fda3ff077b04d5b7ac6706c

  • SHA1

    ff33c3ffc150f9a23dfc7ddac2dd8801b1e29f08

  • SHA256

    4ff1452566fc312f9630c1fa2a2250a665e1ec3602b7168e4240306b114eae84

  • SHA512

    007419858c4238e8a89b4bf70df9ec9fd36fe43c22de159fcecf7ea2aef9248da816e15342bb57901fe49213a86bb4a010c7b60ea144411581df06269767a441

  • SSDEEP

    192:/YXEoQewsETX0YMd1oyn3keo+4E5rMdPqaDdDWLkqQl:/QEgwsEoVd1yS5rMhXh6Ql

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ff1452566fc312f9630c1fa2a2250a665e1ec3602b7168e4240306b114eae84.exe
    "C:\Users\Admin\AppData\Local\Temp\4ff1452566fc312f9630c1fa2a2250a665e1ec3602b7168e4240306b114eae84.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\erdou.exe
      "C:\Users\Admin\AppData\Local\Temp\erdou.exe"
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Modifies system certificate store
      PID:580

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\erdou.exe
    Filesize

    22KB

    MD5

    c8e1bd719171b1f28e1bc42a2cc6bdfc

    SHA1

    6a71212d04b4c6c3bf7ec029facec3de770d5e2e

    SHA256

    107d7a155b958e6fd4a20ccba7aa3470d7bf19b591354d50159ef82299d5f633

    SHA512

    5b2df0437c1f977426e50b0ae4d885d3390f63ef45229dcb4c73bb37097a7560cb92d4f99a5bd150682b43e94aff13c2316412a986c9703f186aa982386a0250

  • C:\Users\Admin\AppData\Local\Temp\erdou.exe
    Filesize

    22KB

    MD5

    c8e1bd719171b1f28e1bc42a2cc6bdfc

    SHA1

    6a71212d04b4c6c3bf7ec029facec3de770d5e2e

    SHA256

    107d7a155b958e6fd4a20ccba7aa3470d7bf19b591354d50159ef82299d5f633

    SHA512

    5b2df0437c1f977426e50b0ae4d885d3390f63ef45229dcb4c73bb37097a7560cb92d4f99a5bd150682b43e94aff13c2316412a986c9703f186aa982386a0250

  • \Users\Admin\AppData\Local\Temp\erdou.exe
    Filesize

    22KB

    MD5

    c8e1bd719171b1f28e1bc42a2cc6bdfc

    SHA1

    6a71212d04b4c6c3bf7ec029facec3de770d5e2e

    SHA256

    107d7a155b958e6fd4a20ccba7aa3470d7bf19b591354d50159ef82299d5f633

    SHA512

    5b2df0437c1f977426e50b0ae4d885d3390f63ef45229dcb4c73bb37097a7560cb92d4f99a5bd150682b43e94aff13c2316412a986c9703f186aa982386a0250

  • memory/580-57-0x0000000000000000-mapping.dmp
  • memory/580-61-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/2044-54-0x0000000076B51000-0x0000000076B53000-memory.dmp
    Filesize

    8KB

  • memory/2044-55-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB