Analysis

  • max time kernel
    310s
  • max time network
    340s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:36

General

  • Target

    5518ec55a079af1a62b0bc3c7437f2a9c350c9ce2d2e6a42d62f44d5bee1d4be.exe

  • Size

    8.7MB

  • MD5

    a3fd2f475c6f97a4d0dbd1aeea2683f4

  • SHA1

    098c3dab659c8361838d2c783e542ff96921dc1d

  • SHA256

    5518ec55a079af1a62b0bc3c7437f2a9c350c9ce2d2e6a42d62f44d5bee1d4be

  • SHA512

    53eec4440f82d91d246a2f7e08e7e97c75ad4be3c1708c4ef2277aa4bfbff1613f715cd82157f4e1c56d5b7153f1640443084eb584ec307e9f594585ba5c1b25

  • SSDEEP

    196608:32yL6zwhgAvXfxWgXkwDYVn6/K1mjSWOOESvDInlzf6YP:GyL6zwhbv1XvDOnSVFkpz

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5518ec55a079af1a62b0bc3c7437f2a9c350c9ce2d2e6a42d62f44d5bee1d4be.exe
    "C:\Users\Admin\AppData\Local\Temp\5518ec55a079af1a62b0bc3c7437f2a9c350c9ce2d2e6a42d62f44d5bee1d4be.exe"
    1⤵
    • Loads dropped DLL
    PID:4080
    • C:\Users\Admin\AppData\Local\Temp\nsq37B2.tmp\Pqfen.exe
      "C:\Users\Admin\AppData\Local\Temp\nsq37B2.tmp\Pqfen.exe"
      2⤵
        PID:3848

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nsq37B2.tmp\StdUtils.dll
      Filesize

      14KB

      MD5

      21010df9bc37daffcc0b5ae190381d85

      SHA1

      a8ba022aafc1233894db29e40e569dfc8b280eb9

      SHA256

      0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

      SHA512

      95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

    • C:\Users\Admin\AppData\Local\Temp\nsq37B2.tmp\System.dll
      Filesize

      11KB

      MD5

      00a0194c20ee912257df53bfe258ee4a

      SHA1

      d7b4e319bc5119024690dc8230b9cc919b1b86b2

      SHA256

      dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

      SHA512

      3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

    • C:\Users\Admin\AppData\Local\Temp\nsq37B2.tmp\WrapperUtils.dll
      Filesize

      57KB

      MD5

      c4fd010850fca98b91b2b1f69adc5dbe

      SHA1

      0df941edfde65d932d0a8f71bb2a7636dc8f5a5c

      SHA256

      8a13565385d19f7667518aad4c783671060957f1ca614f590f738e31e8c59ae1

      SHA512

      9cb39d0cb3581a6c8387b933030e12c83388a54605fa7cf185f79486da58d96a02ed7cdd97a72d3fd3a01a742d964e69b306f90a57c2d2e4eddfc451cf85efb4