Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:43

General

  • Target

    b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe

  • Size

    1.1MB

  • MD5

    e4bf08a6daac8b4c0289fbdfb8c0d504

  • SHA1

    92c821766f301228fbd59495587b76747a60fad7

  • SHA256

    b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e

  • SHA512

    4a0d647f3868d727fea9699d4d645bcbca14b848e2eaecb292b1ef9b855be1d9c7e5d7993a1a5e726ecef9c2069a5880dc85f0f5130a1d3047964dcaad27c588

  • SSDEEP

    24576:LRmJkcoQricOIQxiZY1WNyUdPizldLFvusj24sDVdzvTud:IJZoQrbTFZY1WNyGiz1C45

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1372
      • C:\Users\Admin\AppData\Local\Temp\b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe
        "C:\Users\Admin\AppData\Local\Temp\b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Users\Admin\AppData\Local\Temp\b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe
          "C:\Users\Admin\AppData\Local\Temp\b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:804
          • C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe
            "C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1068
            • C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe
              "C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1704
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp82aa665f.bat"
            4⤵
            • Deletes itself
            PID:592
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1316
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1248
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
          1⤵
            PID:1276
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:1528
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:2004
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1948
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:2016

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\tmp82aa665f.bat

                    Filesize

                    307B

                    MD5

                    81bcf41f7530ad359fd82dbd88aed166

                    SHA1

                    da6b699b9bde997f677349260abff731be159d7f

                    SHA256

                    c987a752c3eec2376d818d47a2588eeb9ffc7e37c52014b64c1f2b285d7bef4e

                    SHA512

                    0ab85966cf9af12bd05a367baef1bcbdc1c2b63c883eab6345619b9be4ae8b355d583fe27337ac7c34a67649407ec8362cd8a6202e785db75d21b882bb5eaafb

                  • C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe

                    Filesize

                    1.1MB

                    MD5

                    40cfb8b6b43d08522464af502d92befd

                    SHA1

                    97737dc19d285a1782e6b935619f40492eff4ac6

                    SHA256

                    7900da16c8dd4b6bd6200d2462a848b7a0d4139954828303ffb9f7e2ebabda63

                    SHA512

                    b5ba161b14b251b03c2585666e5e34ad6b5c65ae8db68e6ef7301e480f94919920808e4a52af0264cf307864743e6d38c2929425c6fcbcbadcef3f8a00fba09b

                  • C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe

                    Filesize

                    1.1MB

                    MD5

                    40cfb8b6b43d08522464af502d92befd

                    SHA1

                    97737dc19d285a1782e6b935619f40492eff4ac6

                    SHA256

                    7900da16c8dd4b6bd6200d2462a848b7a0d4139954828303ffb9f7e2ebabda63

                    SHA512

                    b5ba161b14b251b03c2585666e5e34ad6b5c65ae8db68e6ef7301e480f94919920808e4a52af0264cf307864743e6d38c2929425c6fcbcbadcef3f8a00fba09b

                  • C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe

                    Filesize

                    1.1MB

                    MD5

                    40cfb8b6b43d08522464af502d92befd

                    SHA1

                    97737dc19d285a1782e6b935619f40492eff4ac6

                    SHA256

                    7900da16c8dd4b6bd6200d2462a848b7a0d4139954828303ffb9f7e2ebabda63

                    SHA512

                    b5ba161b14b251b03c2585666e5e34ad6b5c65ae8db68e6ef7301e480f94919920808e4a52af0264cf307864743e6d38c2929425c6fcbcbadcef3f8a00fba09b

                  • \Users\Admin\AppData\Roaming\Qepaf\uxof.exe

                    Filesize

                    1.1MB

                    MD5

                    40cfb8b6b43d08522464af502d92befd

                    SHA1

                    97737dc19d285a1782e6b935619f40492eff4ac6

                    SHA256

                    7900da16c8dd4b6bd6200d2462a848b7a0d4139954828303ffb9f7e2ebabda63

                    SHA512

                    b5ba161b14b251b03c2585666e5e34ad6b5c65ae8db68e6ef7301e480f94919920808e4a52af0264cf307864743e6d38c2929425c6fcbcbadcef3f8a00fba09b

                  • memory/592-85-0x0000000000000000-mapping.dmp

                  • memory/804-59-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/804-56-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/804-66-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/804-67-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/804-60-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/804-86-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/804-62-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/804-57-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/804-63-0x0000000000413048-mapping.dmp

                  • memory/1068-72-0x0000000000400000-0x00000000004B5000-memory.dmp

                    Filesize

                    724KB

                  • memory/1068-69-0x0000000000000000-mapping.dmp

                  • memory/1248-92-0x0000000001B40000-0x0000000001B67000-memory.dmp

                    Filesize

                    156KB

                  • memory/1248-89-0x0000000001B40000-0x0000000001B67000-memory.dmp

                    Filesize

                    156KB

                  • memory/1248-90-0x0000000001B40000-0x0000000001B67000-memory.dmp

                    Filesize

                    156KB

                  • memory/1248-91-0x0000000001B40000-0x0000000001B67000-memory.dmp

                    Filesize

                    156KB

                  • memory/1276-112-0x0000000001B60000-0x0000000001B87000-memory.dmp

                    Filesize

                    156KB

                  • memory/1276-109-0x0000000001B60000-0x0000000001B87000-memory.dmp

                    Filesize

                    156KB

                  • memory/1276-111-0x0000000001B60000-0x0000000001B87000-memory.dmp

                    Filesize

                    156KB

                  • memory/1276-110-0x0000000001B60000-0x0000000001B87000-memory.dmp

                    Filesize

                    156KB

                  • memory/1316-96-0x0000000000230000-0x0000000000257000-memory.dmp

                    Filesize

                    156KB

                  • memory/1316-97-0x0000000000230000-0x0000000000257000-memory.dmp

                    Filesize

                    156KB

                  • memory/1316-95-0x0000000000230000-0x0000000000257000-memory.dmp

                    Filesize

                    156KB

                  • memory/1316-99-0x0000000000230000-0x0000000000257000-memory.dmp

                    Filesize

                    156KB

                  • memory/1372-106-0x0000000002730000-0x0000000002757000-memory.dmp

                    Filesize

                    156KB

                  • memory/1372-105-0x0000000002730000-0x0000000002757000-memory.dmp

                    Filesize

                    156KB

                  • memory/1372-102-0x0000000002730000-0x0000000002757000-memory.dmp

                    Filesize

                    156KB

                  • memory/1372-104-0x0000000002730000-0x0000000002757000-memory.dmp

                    Filesize

                    156KB

                  • memory/1528-115-0x0000000003A50000-0x0000000003A77000-memory.dmp

                    Filesize

                    156KB

                  • memory/1528-117-0x0000000003A50000-0x0000000003A77000-memory.dmp

                    Filesize

                    156KB

                  • memory/1528-118-0x0000000003A50000-0x0000000003A77000-memory.dmp

                    Filesize

                    156KB

                  • memory/1528-116-0x0000000003A50000-0x0000000003A77000-memory.dmp

                    Filesize

                    156KB

                  • memory/1640-54-0x0000000075811000-0x0000000075813000-memory.dmp

                    Filesize

                    8KB

                  • memory/1640-55-0x0000000000400000-0x00000000004B5000-memory.dmp

                    Filesize

                    724KB

                  • memory/1704-81-0x0000000000413048-mapping.dmp

                  • memory/1704-103-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1704-119-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1948-128-0x0000000000110000-0x0000000000137000-memory.dmp

                    Filesize

                    156KB

                  • memory/1948-129-0x0000000000110000-0x0000000000137000-memory.dmp

                    Filesize

                    156KB

                  • memory/1948-130-0x0000000000110000-0x0000000000137000-memory.dmp

                    Filesize

                    156KB

                  • memory/1948-131-0x0000000000110000-0x0000000000137000-memory.dmp

                    Filesize

                    156KB

                  • memory/2004-122-0x0000000000210000-0x0000000000237000-memory.dmp

                    Filesize

                    156KB

                  • memory/2004-123-0x0000000000210000-0x0000000000237000-memory.dmp

                    Filesize

                    156KB

                  • memory/2004-124-0x0000000000210000-0x0000000000237000-memory.dmp

                    Filesize

                    156KB

                  • memory/2004-125-0x0000000000210000-0x0000000000237000-memory.dmp

                    Filesize

                    156KB