Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:05

General

  • Target

    2358035b1b261f8a20d2aaf319805dd339a73c9937eaa7b1e97c626e016dc57e.exe

  • Size

    5.6MB

  • MD5

    601c231b9179e8a26c32b7ea768ff9fa

  • SHA1

    bf0e234e6044e67f82604bf4eea31772bb9aaa7f

  • SHA256

    2358035b1b261f8a20d2aaf319805dd339a73c9937eaa7b1e97c626e016dc57e

  • SHA512

    a6b64763130e54b1eab160647a61aef729cdb841bd864b2239363bf25e10c2b510dee6c086900c2bb5ed47122b8de692e21a83872cbea850930aa3661feb8c24

  • SSDEEP

    98304:6VH613QPlfOnNhfJkRyTrpcTcCGQD/7vwGAB8HDA6azXCcA0kotVx5Qsasq3:saRUlfONh2Ec3nEEKCcvkK5QsasG

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2358035b1b261f8a20d2aaf319805dd339a73c9937eaa7b1e97c626e016dc57e.exe
    "C:\Users\Admin\AppData\Local\Temp\2358035b1b261f8a20d2aaf319805dd339a73c9937eaa7b1e97c626e016dc57e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4884
    • C:\Users\Admin\AppData\Local\Temp\is-50R0T.tmp\2358035b1b261f8a20d2aaf319805dd339a73c9937eaa7b1e97c626e016dc57e.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-50R0T.tmp\2358035b1b261f8a20d2aaf319805dd339a73c9937eaa7b1e97c626e016dc57e.tmp" /SL5="$8004A,5604491,56832,C:\Users\Admin\AppData\Local\Temp\2358035b1b261f8a20d2aaf319805dd339a73c9937eaa7b1e97c626e016dc57e.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-50R0T.tmp\2358035b1b261f8a20d2aaf319805dd339a73c9937eaa7b1e97c626e016dc57e.tmp

    Filesize

    690KB

    MD5

    1305181de520f125aeabf85dc24a89d6

    SHA1

    98b7548fede3f1468ccbdee405abdc4e5d2ec671

    SHA256

    0e19765b89a1a29afee09810dcb3ec5cc7c66053947be8f1aebdbb7c801dfeaf

    SHA512

    b0bfa9749a6a5a18c1926e6c5ebb4cdb156df1652cb822f067422a1cd21583340f32e4a1fc2f4c21a09343d73a55651972edbd2dec98ce44641a1097c16bc793

  • C:\Users\Admin\AppData\Local\Temp\is-50R0T.tmp\2358035b1b261f8a20d2aaf319805dd339a73c9937eaa7b1e97c626e016dc57e.tmp

    Filesize

    690KB

    MD5

    1305181de520f125aeabf85dc24a89d6

    SHA1

    98b7548fede3f1468ccbdee405abdc4e5d2ec671

    SHA256

    0e19765b89a1a29afee09810dcb3ec5cc7c66053947be8f1aebdbb7c801dfeaf

    SHA512

    b0bfa9749a6a5a18c1926e6c5ebb4cdb156df1652cb822f067422a1cd21583340f32e4a1fc2f4c21a09343d73a55651972edbd2dec98ce44641a1097c16bc793

  • C:\Users\Admin\AppData\Local\Temp\is-62G9A.tmp\InnoCallback.dll

    Filesize

    63KB

    MD5

    1c55ae5ef9980e3b1028447da6105c75

    SHA1

    f85218e10e6aa23b2f5a3ed512895b437e41b45c

    SHA256

    6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

    SHA512

    1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

  • C:\Users\Admin\AppData\Local\Temp\is-62G9A.tmp\InnoCallback.dll

    Filesize

    63KB

    MD5

    1c55ae5ef9980e3b1028447da6105c75

    SHA1

    f85218e10e6aa23b2f5a3ed512895b437e41b45c

    SHA256

    6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

    SHA512

    1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

  • C:\Users\Admin\AppData\Local\Temp\is-62G9A.tmp\LoaderDll.dll

    Filesize

    381KB

    MD5

    86793901ef19641dc1b53b493927a2b7

    SHA1

    720c5be19158d8295f54a5dfad7a59783da20e91

    SHA256

    cc76361d01e50138c7cd420e11f41392b62dc0161ffbcc029df086b354cae7b6

    SHA512

    1771d99bc49fad3121cc1aed8287e636dafdd754432087532bccbff664ca75cdaecbe3b217c084923e4084d73dc9e060d8436d98c2a6e50f00b04c2127b47286

  • C:\Users\Admin\AppData\Local\Temp\is-62G9A.tmp\LoaderDll.dll

    Filesize

    381KB

    MD5

    86793901ef19641dc1b53b493927a2b7

    SHA1

    720c5be19158d8295f54a5dfad7a59783da20e91

    SHA256

    cc76361d01e50138c7cd420e11f41392b62dc0161ffbcc029df086b354cae7b6

    SHA512

    1771d99bc49fad3121cc1aed8287e636dafdd754432087532bccbff664ca75cdaecbe3b217c084923e4084d73dc9e060d8436d98c2a6e50f00b04c2127b47286

  • C:\Users\Admin\AppData\Local\Temp\is-62G9A.tmp\saction.dll

    Filesize

    356KB

    MD5

    7ada33a1f5e958c97dab09fc14ad0c86

    SHA1

    5b6066f1645788765351bb3eb96517ace2b01040

    SHA256

    7bf04e7acd79050460d37443a0eb00592fe3f6f43a4209a717637d574bd994c0

    SHA512

    ec8440bb91feb1516409212f94ad862e785178fc3fbe88ecb822d19bc7460edcb521e77fe2d75d67ef4ac7edd3c8f3275664bae15ae61161b343b3b0c60ac024

  • memory/4880-140-0x0000000004800000-0x0000000004815000-memory.dmp

    Filesize

    84KB

  • memory/4880-143-0x0000000004920000-0x0000000004987000-memory.dmp

    Filesize

    412KB

  • memory/4880-134-0x0000000000000000-mapping.dmp

  • memory/4880-145-0x0000000005810000-0x000000000595D000-memory.dmp

    Filesize

    1.3MB

  • memory/4884-137-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4884-132-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB