Analysis

  • max time kernel
    187s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:39

General

  • Target

    574360821822eab57be8ef7ec7823d0c9b5ad6a4434f07c83679c9f8c9bceb39.exe

  • Size

    49KB

  • MD5

    b3492e6234d5e779ad704fc5a7984d1a

  • SHA1

    8cb10ffceef043fe05d274053ddb4c8aa27c34b7

  • SHA256

    574360821822eab57be8ef7ec7823d0c9b5ad6a4434f07c83679c9f8c9bceb39

  • SHA512

    9d4165b7d5cecba8c81dda22b28c2163f74d16a4fbe9bbaf542258ffb92cfce68843916d48946c03b4694bf4960549034c25256a07c4cb951db058bbb281caae

  • SSDEEP

    1536:9kswQDYrZo5isPqo78fXJzgW0nJsOg6vk:2DQkrZoosbIfXJEW0nbNk

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Script User-Agent 34 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\574360821822eab57be8ef7ec7823d0c9b5ad6a4434f07c83679c9f8c9bceb39.exe
    "C:\Users\Admin\AppData\Local\Temp\574360821822eab57be8ef7ec7823d0c9b5ad6a4434f07c83679c9f8c9bceb39.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe
      C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1464

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe

    Filesize

    49KB

    MD5

    b3492e6234d5e779ad704fc5a7984d1a

    SHA1

    8cb10ffceef043fe05d274053ddb4c8aa27c34b7

    SHA256

    574360821822eab57be8ef7ec7823d0c9b5ad6a4434f07c83679c9f8c9bceb39

    SHA512

    9d4165b7d5cecba8c81dda22b28c2163f74d16a4fbe9bbaf542258ffb92cfce68843916d48946c03b4694bf4960549034c25256a07c4cb951db058bbb281caae

  • C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe

    Filesize

    49KB

    MD5

    b3492e6234d5e779ad704fc5a7984d1a

    SHA1

    8cb10ffceef043fe05d274053ddb4c8aa27c34b7

    SHA256

    574360821822eab57be8ef7ec7823d0c9b5ad6a4434f07c83679c9f8c9bceb39

    SHA512

    9d4165b7d5cecba8c81dda22b28c2163f74d16a4fbe9bbaf542258ffb92cfce68843916d48946c03b4694bf4960549034c25256a07c4cb951db058bbb281caae

  • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe

    Filesize

    24KB

    MD5

    d40a161f35002deebb3f54a011d5e5a4

    SHA1

    8c7ccc725ad8b0959b5a66256569801cb1d83008

    SHA256

    f37dcee3994e60cf255f0effcce5d0aabecae4120088d7cf2ceeec14179d871d

    SHA512

    634e56cc064ec360434b18f324a3bb3e1b6e3471491903cc262a5793e63b53de8e23dc17f89c56a5d8854e18997ebbbc05d079184e1a03212af9bafc7ebd9302

  • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe

    Filesize

    24KB

    MD5

    d40a161f35002deebb3f54a011d5e5a4

    SHA1

    8c7ccc725ad8b0959b5a66256569801cb1d83008

    SHA256

    f37dcee3994e60cf255f0effcce5d0aabecae4120088d7cf2ceeec14179d871d

    SHA512

    634e56cc064ec360434b18f324a3bb3e1b6e3471491903cc262a5793e63b53de8e23dc17f89c56a5d8854e18997ebbbc05d079184e1a03212af9bafc7ebd9302

  • \Users\Admin\AppData\Local\Temp\nse99A4.tmp\System.dll

    Filesize

    11KB

    MD5

    a436db0c473a087eb61ff5c53c34ba27

    SHA1

    65ea67e424e75f5065132b539c8b2eda88aa0506

    SHA256

    75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49

    SHA512

    908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d

  • \Users\Admin\AppData\Roaming\sychost\appdomain.exe

    Filesize

    49KB

    MD5

    b3492e6234d5e779ad704fc5a7984d1a

    SHA1

    8cb10ffceef043fe05d274053ddb4c8aa27c34b7

    SHA256

    574360821822eab57be8ef7ec7823d0c9b5ad6a4434f07c83679c9f8c9bceb39

    SHA512

    9d4165b7d5cecba8c81dda22b28c2163f74d16a4fbe9bbaf542258ffb92cfce68843916d48946c03b4694bf4960549034c25256a07c4cb951db058bbb281caae

  • \Users\Admin\AppData\Roaming\sychost\sychost.exe

    Filesize

    24KB

    MD5

    d40a161f35002deebb3f54a011d5e5a4

    SHA1

    8c7ccc725ad8b0959b5a66256569801cb1d83008

    SHA256

    f37dcee3994e60cf255f0effcce5d0aabecae4120088d7cf2ceeec14179d871d

    SHA512

    634e56cc064ec360434b18f324a3bb3e1b6e3471491903cc262a5793e63b53de8e23dc17f89c56a5d8854e18997ebbbc05d079184e1a03212af9bafc7ebd9302

  • memory/940-56-0x0000000074451000-0x0000000074453000-memory.dmp

    Filesize

    8KB

  • memory/940-54-0x0000000075B61000-0x0000000075B63000-memory.dmp

    Filesize

    8KB

  • memory/1400-58-0x0000000000000000-mapping.dmp

  • memory/1464-63-0x0000000000000000-mapping.dmp

  • memory/1464-67-0x00000000740C0000-0x000000007466B000-memory.dmp

    Filesize

    5.7MB

  • memory/1464-68-0x00000000740C0000-0x000000007466B000-memory.dmp

    Filesize

    5.7MB

  • memory/1464-69-0x0000000001FF9000-0x000000000200A000-memory.dmp

    Filesize

    68KB

  • memory/1464-70-0x0000000001FF9000-0x000000000200A000-memory.dmp

    Filesize

    68KB