Analysis

  • max time kernel
    225s
  • max time network
    314s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:50

General

  • Target

    687c7d8030b9f15bd2ef857116ef8c0c6fe83aa998ff32dab406beb0d4e759c2.exe

  • Size

    22KB

  • MD5

    79b1f47c0dfd99f974d2920a381ad91f

  • SHA1

    c440b90511dcbe337e04dd56ce582f8c7441e891

  • SHA256

    687c7d8030b9f15bd2ef857116ef8c0c6fe83aa998ff32dab406beb0d4e759c2

  • SHA512

    6b5796238b34e9245b78c58a92551372006138aab54ce224c06b4c2afae0172a984202b95c13298ffe89c2196aaaa859e7707b8c6c7615313a089f1791c7de06

  • SSDEEP

    192:tbJVvBjraenIHX9+f1qulZjYpjorHq1oynIJguqv4E5rMdPqaDdDWLkqUN:tbTpjG7X9ehZjYp4K11p5rMhXh6UN

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\687c7d8030b9f15bd2ef857116ef8c0c6fe83aa998ff32dab406beb0d4e759c2.exe
    "C:\Users\Admin\AppData\Local\Temp\687c7d8030b9f15bd2ef857116ef8c0c6fe83aa998ff32dab406beb0d4e759c2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:600
    • C:\Users\Admin\AppData\Local\Temp\zcrjc.exe
      "C:\Users\Admin\AppData\Local\Temp\zcrjc.exe"
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Modifies system certificate store
      PID:1340

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\zcrjc.exe
    Filesize

    22KB

    MD5

    a349a6e6a2baac61c37c87e79c737289

    SHA1

    dab7142f1cba7c703db74d38ec971e18add95d2a

    SHA256

    d99ba6343495c6bb81f49000e316540b9081111ce00d673982f96723b9e028b3

    SHA512

    82a98e41bcb76e1e0005db44fa9185bcfde292bad20cd472c76b4dbe7fc125e7b4127247aa0f3079d7cb551c1b45fd323a537503961189beabebacc011f5355d

  • C:\Users\Admin\AppData\Local\Temp\zcrjc.exe
    Filesize

    22KB

    MD5

    a349a6e6a2baac61c37c87e79c737289

    SHA1

    dab7142f1cba7c703db74d38ec971e18add95d2a

    SHA256

    d99ba6343495c6bb81f49000e316540b9081111ce00d673982f96723b9e028b3

    SHA512

    82a98e41bcb76e1e0005db44fa9185bcfde292bad20cd472c76b4dbe7fc125e7b4127247aa0f3079d7cb551c1b45fd323a537503961189beabebacc011f5355d

  • \Users\Admin\AppData\Local\Temp\zcrjc.exe
    Filesize

    22KB

    MD5

    a349a6e6a2baac61c37c87e79c737289

    SHA1

    dab7142f1cba7c703db74d38ec971e18add95d2a

    SHA256

    d99ba6343495c6bb81f49000e316540b9081111ce00d673982f96723b9e028b3

    SHA512

    82a98e41bcb76e1e0005db44fa9185bcfde292bad20cd472c76b4dbe7fc125e7b4127247aa0f3079d7cb551c1b45fd323a537503961189beabebacc011f5355d

  • memory/600-54-0x00000000753F1000-0x00000000753F3000-memory.dmp
    Filesize

    8KB

  • memory/600-55-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/1340-57-0x0000000000000000-mapping.dmp
  • memory/1340-61-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB