Analysis

  • max time kernel
    149s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:39

General

  • Target

    2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe

  • Size

    513KB

  • MD5

    54f50f9113735eda1abb252942a1e2a6

  • SHA1

    59cfb1d4c66cae5e1f144c37ded3de5f150c89d0

  • SHA256

    2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c

  • SHA512

    a9bd8c367471aae9e9696cb57866f4b5d7485e704d8cd62687b66613e7ec5a44322bcccce3756d7f9cff8f7e3b4c56aba7c6e8060eaefe0967250e2b40ef6124

  • SSDEEP

    6144:eACT0ekq+7G40l/qDAqmglWGbl7sv6Q180p9wC4X:eACTR+76/jqPlWKsdXw

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe
    "C:\Users\Admin\AppData\Local\Temp\2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "GameGuardBypasser" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Sounds11.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "GameGuardBypasser" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Sounds11.exe
        3⤵
        • Adds Run key to start application
        PID:556
    • C:\Users\Admin\AppData\Roaming\Java1.exe
      "C:\Users\Admin\AppData\Roaming\Java1.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "GameGuardBypasser" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Sounds11.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "GameGuardBypasser" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Sounds11.exe
          4⤵
          • Adds Run key to start application
          PID:1376
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Java1.exe" "Java1.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:996

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Sounds11.exe

    Filesize

    513KB

    MD5

    54f50f9113735eda1abb252942a1e2a6

    SHA1

    59cfb1d4c66cae5e1f144c37ded3de5f150c89d0

    SHA256

    2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c

    SHA512

    a9bd8c367471aae9e9696cb57866f4b5d7485e704d8cd62687b66613e7ec5a44322bcccce3756d7f9cff8f7e3b4c56aba7c6e8060eaefe0967250e2b40ef6124

  • C:\Users\Admin\AppData\Roaming\Java1.exe

    Filesize

    513KB

    MD5

    54f50f9113735eda1abb252942a1e2a6

    SHA1

    59cfb1d4c66cae5e1f144c37ded3de5f150c89d0

    SHA256

    2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c

    SHA512

    a9bd8c367471aae9e9696cb57866f4b5d7485e704d8cd62687b66613e7ec5a44322bcccce3756d7f9cff8f7e3b4c56aba7c6e8060eaefe0967250e2b40ef6124

  • C:\Users\Admin\AppData\Roaming\Java1.exe

    Filesize

    513KB

    MD5

    54f50f9113735eda1abb252942a1e2a6

    SHA1

    59cfb1d4c66cae5e1f144c37ded3de5f150c89d0

    SHA256

    2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c

    SHA512

    a9bd8c367471aae9e9696cb57866f4b5d7485e704d8cd62687b66613e7ec5a44322bcccce3756d7f9cff8f7e3b4c56aba7c6e8060eaefe0967250e2b40ef6124

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch

    Filesize

    514B

    MD5

    7b19a23fe73ab279b721605d6ab5c933

    SHA1

    a02c9ac1dad19ea82471bedef4875ce059428020

    SHA256

    a57885af5782d21c79b2976e0d6cc3b7869fa6c90cc61e085357f3700521d427

    SHA512

    12832efd6dafc3d2c26297cc1228e75661b95d085fdc6a5eaab30b249ab9dbea2dc690f0ff6a23ec6c05b823687ceb86551f385ee3fd1e0e21a0c1344f120e8a

  • \Users\Admin\AppData\Roaming\Java1.exe

    Filesize

    513KB

    MD5

    54f50f9113735eda1abb252942a1e2a6

    SHA1

    59cfb1d4c66cae5e1f144c37ded3de5f150c89d0

    SHA256

    2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c

    SHA512

    a9bd8c367471aae9e9696cb57866f4b5d7485e704d8cd62687b66613e7ec5a44322bcccce3756d7f9cff8f7e3b4c56aba7c6e8060eaefe0967250e2b40ef6124

  • \Users\Admin\AppData\Roaming\Java1.exe

    Filesize

    513KB

    MD5

    54f50f9113735eda1abb252942a1e2a6

    SHA1

    59cfb1d4c66cae5e1f144c37ded3de5f150c89d0

    SHA256

    2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c

    SHA512

    a9bd8c367471aae9e9696cb57866f4b5d7485e704d8cd62687b66613e7ec5a44322bcccce3756d7f9cff8f7e3b4c56aba7c6e8060eaefe0967250e2b40ef6124

  • memory/556-56-0x0000000000000000-mapping.dmp

  • memory/996-68-0x0000000000000000-mapping.dmp

  • memory/1376-67-0x0000000000000000-mapping.dmp

  • memory/1444-54-0x0000000075D71000-0x0000000075D73000-memory.dmp

    Filesize

    8KB

  • memory/1444-57-0x0000000074850000-0x0000000074DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/1444-71-0x0000000074850000-0x0000000074DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/1680-60-0x0000000000000000-mapping.dmp

  • memory/1680-70-0x0000000074850000-0x0000000074DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/1680-72-0x0000000074850000-0x0000000074DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/1716-55-0x0000000000000000-mapping.dmp

  • memory/1956-66-0x0000000000000000-mapping.dmp