Analysis

  • max time kernel
    186s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:46

General

  • Target

    79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe

  • Size

    172KB

  • MD5

    60a7a8b1c78cb2ed4becd00a6456dbc8

  • SHA1

    09bd14a2853b5f5a8babbdd552a4953c43c2f483

  • SHA256

    79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56

  • SHA512

    09b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6

  • SSDEEP

    3072:iJ0A2KvUXh9O5P908zsStvqeSwCKx83lUICxsqcAeSQ:i0A2auu10usSJbuKxAlicbS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe
    "C:\Users\Admin\AppData\Local\Temp\79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Windows\temp\svchost.exe
      "C:\Windows\temp\svchost.exe" -install
      2⤵
      • Executes dropped EXE
      PID:1624
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\~0.bat" "
      2⤵
      • Deletes itself
      PID:1772
  • C:\Windows\temp\svchost.exe
    C:\Windows\temp\svchost.exe
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~0.bat

    Filesize

    258B

    MD5

    a9d9e7069fee2197452e6bfdd806e851

    SHA1

    0ce3a2040fce0a3f7dfc0f4ec5a6c66240063c12

    SHA256

    8e0e0f2c1b3df7f15def6cc9e9e0735e75fb9e5952e33a103c65f6e12d8ab151

    SHA512

    440a8f8e201080e759aa407577b8c36467aad5d7edb0d4bfe7a05a8bc7466c096113e47b32dfc660b3e8112889cf51e881ae31fe760b39b78459af4cad18a03d

  • C:\Windows\Temp\svchost.exe

    Filesize

    172KB

    MD5

    60a7a8b1c78cb2ed4becd00a6456dbc8

    SHA1

    09bd14a2853b5f5a8babbdd552a4953c43c2f483

    SHA256

    79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56

    SHA512

    09b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6

  • C:\Windows\Temp\svchost.exe

    Filesize

    172KB

    MD5

    60a7a8b1c78cb2ed4becd00a6456dbc8

    SHA1

    09bd14a2853b5f5a8babbdd552a4953c43c2f483

    SHA256

    79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56

    SHA512

    09b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6

  • C:\Windows\temp\svchost.exe

    Filesize

    172KB

    MD5

    60a7a8b1c78cb2ed4becd00a6456dbc8

    SHA1

    09bd14a2853b5f5a8babbdd552a4953c43c2f483

    SHA256

    79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56

    SHA512

    09b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6

  • \Windows\Temp\svchost.exe

    Filesize

    172KB

    MD5

    60a7a8b1c78cb2ed4becd00a6456dbc8

    SHA1

    09bd14a2853b5f5a8babbdd552a4953c43c2f483

    SHA256

    79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56

    SHA512

    09b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6

  • \Windows\Temp\svchost.exe

    Filesize

    172KB

    MD5

    60a7a8b1c78cb2ed4becd00a6456dbc8

    SHA1

    09bd14a2853b5f5a8babbdd552a4953c43c2f483

    SHA256

    79a425882aacd28acb86b45017a57152049a4af1e3b30b7aff7e6f8eff0e8c56

    SHA512

    09b24a8ceb41f88f790e3e10398f40b86d4def12b951e9beac6022f14fdc6723222152225b72e2d0823a4c0f7961749aba5510253382b67969f0ccb50219dba6

  • memory/1064-54-0x0000000075501000-0x0000000075503000-memory.dmp

    Filesize

    8KB

  • memory/1624-57-0x0000000000000000-mapping.dmp

  • memory/1772-63-0x0000000000000000-mapping.dmp