Analysis

  • max time kernel
    151s
  • max time network
    193s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:43

General

  • Target

    d43f4310b033e867cf15dbe958cf5c515b1985b9101eef5fb0af7698f3d959c5.exe

  • Size

    128KB

  • MD5

    98ca98af6e716cb5a6bfff5cebc1e9b4

  • SHA1

    45b5b309ee779a139fb5ec86f1785a0c1962903a

  • SHA256

    d43f4310b033e867cf15dbe958cf5c515b1985b9101eef5fb0af7698f3d959c5

  • SHA512

    0e78721183993822a68669a2e29fd015f98e41a6cc38154c1b774cdba28d586c4003dc8db27e2dbab6793868415d3d00c06002fe0d16bef2ea23f01684ed37b7

  • SSDEEP

    3072:vhlM6ftRbpsd/D6/tTkM2QjBiebMRIFHVE6+o/WdWKXkYiRwbiC:NLMYP/gWKXk

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d43f4310b033e867cf15dbe958cf5c515b1985b9101eef5fb0af7698f3d959c5.exe
    "C:\Users\Admin\AppData\Local\Temp\d43f4310b033e867cf15dbe958cf5c515b1985b9101eef5fb0af7698f3d959c5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\AppData\Local\Temp\d43f4310b033e867cf15dbe958cf5c515b1985b9101eef5fb0af7698f3d959c5.exe
      "C:\Users\Admin\AppData\Local\Temp\d43f4310b033e867cf15dbe958cf5c515b1985b9101eef5fb0af7698f3d959c5.exe"
      2⤵
      • UAC bypass
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1984
      • C:\Windows\SysWOW64\netsh.exe
        "C:\Windows\System32\netsh.exe" Firewall set opmode disable
        3⤵
        • Modifies Windows Firewall
        PID:476
      • C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\tMdlgiTa0.exe
        "C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\tMdlgiTa0.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1052
        • C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\tMdlgiTa0.exe
          "C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\tMdlgiTa0.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1312
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\System32\netsh.exe" Firewall set opmode disable
            5⤵
            • Modifies Windows Firewall
            PID:1964
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\ProgramData\RKUTjEo.vbs"
            5⤵
              PID:1880

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\.{1e69ee4b-0de4-3437-8433-efecf940be05}\1e69ee4b0de434378433efecf940be05

      Filesize

      43B

      MD5

      13f633e687377315a794c44697c197ea

      SHA1

      6de424807f1b73c24200050fd01670010ec534ce

      SHA256

      1e6b5f58e8505dc4d8447f6b1488bdaa0a7545a58be8eacfae02368d44beffac

      SHA512

      66520c5260e65565e8d99218f88477fd4b6c60ec8e8ad4c14258cec307304e4ba57c1217055c70d9bad2084bd1a3b1f2c144b0abf6fd2c8ed9307b877453cdf8

    • C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\tMdlgiTa0.exe

      Filesize

      128KB

      MD5

      98ca98af6e716cb5a6bfff5cebc1e9b4

      SHA1

      45b5b309ee779a139fb5ec86f1785a0c1962903a

      SHA256

      d43f4310b033e867cf15dbe958cf5c515b1985b9101eef5fb0af7698f3d959c5

      SHA512

      0e78721183993822a68669a2e29fd015f98e41a6cc38154c1b774cdba28d586c4003dc8db27e2dbab6793868415d3d00c06002fe0d16bef2ea23f01684ed37b7

    • C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\tMdlgiTa0.exe

      Filesize

      128KB

      MD5

      98ca98af6e716cb5a6bfff5cebc1e9b4

      SHA1

      45b5b309ee779a139fb5ec86f1785a0c1962903a

      SHA256

      d43f4310b033e867cf15dbe958cf5c515b1985b9101eef5fb0af7698f3d959c5

      SHA512

      0e78721183993822a68669a2e29fd015f98e41a6cc38154c1b774cdba28d586c4003dc8db27e2dbab6793868415d3d00c06002fe0d16bef2ea23f01684ed37b7

    • C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\tMdlgiTa0.exe

      Filesize

      128KB

      MD5

      98ca98af6e716cb5a6bfff5cebc1e9b4

      SHA1

      45b5b309ee779a139fb5ec86f1785a0c1962903a

      SHA256

      d43f4310b033e867cf15dbe958cf5c515b1985b9101eef5fb0af7698f3d959c5

      SHA512

      0e78721183993822a68669a2e29fd015f98e41a6cc38154c1b774cdba28d586c4003dc8db27e2dbab6793868415d3d00c06002fe0d16bef2ea23f01684ed37b7

    • C:\ProgramData\RKUTjEo.vbs

      Filesize

      684B

      MD5

      632cbf91fe5558f76df0c55163122541

      SHA1

      3af76520cff3d928a66a6f997a6ac0ba18bb9eef

      SHA256

      6adbd648e243599151cb272ebb7ed142d11b12b91b84f4b3b1a5203c65d27ddd

      SHA512

      0641ac2d1f863394821a698b71b0f220cac8ac71c116839fcf79cff99117108ce9452203ec5ac07c2933b30ec8c466e2b72fbf35f5d61c55e920b8e895995cd8

    • \ProgramData\3cfdec86b2da3c13a849930b80390b04\tMdlgiTa0.exe

      Filesize

      128KB

      MD5

      98ca98af6e716cb5a6bfff5cebc1e9b4

      SHA1

      45b5b309ee779a139fb5ec86f1785a0c1962903a

      SHA256

      d43f4310b033e867cf15dbe958cf5c515b1985b9101eef5fb0af7698f3d959c5

      SHA512

      0e78721183993822a68669a2e29fd015f98e41a6cc38154c1b774cdba28d586c4003dc8db27e2dbab6793868415d3d00c06002fe0d16bef2ea23f01684ed37b7

    • \ProgramData\3cfdec86b2da3c13a849930b80390b04\tMdlgiTa0.exe

      Filesize

      128KB

      MD5

      98ca98af6e716cb5a6bfff5cebc1e9b4

      SHA1

      45b5b309ee779a139fb5ec86f1785a0c1962903a

      SHA256

      d43f4310b033e867cf15dbe958cf5c515b1985b9101eef5fb0af7698f3d959c5

      SHA512

      0e78721183993822a68669a2e29fd015f98e41a6cc38154c1b774cdba28d586c4003dc8db27e2dbab6793868415d3d00c06002fe0d16bef2ea23f01684ed37b7

    • memory/476-69-0x0000000000000000-mapping.dmp

    • memory/1052-90-0x0000000074F60000-0x000000007550B000-memory.dmp

      Filesize

      5.7MB

    • memory/1052-75-0x0000000000000000-mapping.dmp

    • memory/1312-100-0x0000000074F00000-0x00000000754AB000-memory.dmp

      Filesize

      5.7MB

    • memory/1312-86-0x000000000041750A-mapping.dmp

    • memory/1312-101-0x0000000074F00000-0x00000000754AB000-memory.dmp

      Filesize

      5.7MB

    • memory/1420-66-0x0000000074F70000-0x000000007551B000-memory.dmp

      Filesize

      5.7MB

    • memory/1420-54-0x00000000767B1000-0x00000000767B3000-memory.dmp

      Filesize

      8KB

    • memory/1420-63-0x0000000074F70000-0x000000007551B000-memory.dmp

      Filesize

      5.7MB

    • memory/1880-97-0x0000000000000000-mapping.dmp

    • memory/1964-95-0x0000000000000000-mapping.dmp

    • memory/1984-72-0x0000000074F60000-0x000000007550B000-memory.dmp

      Filesize

      5.7MB

    • memory/1984-79-0x0000000074F60000-0x000000007550B000-memory.dmp

      Filesize

      5.7MB

    • memory/1984-64-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1984-58-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1984-70-0x0000000074F60000-0x000000007550B000-memory.dmp

      Filesize

      5.7MB

    • memory/1984-56-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1984-60-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1984-67-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1984-55-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1984-59-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1984-61-0x000000000041750A-mapping.dmp