Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:37

General

  • Target

    a540da5ac6c1b71a3ec69e3331e092f95b822679d0483c9435fa1a77085c6469.exe

  • Size

    6.1MB

  • MD5

    9e6e4adb1b98f65ddd6920d45cf0fd9f

  • SHA1

    e39a4438a4cc830cba89040e40f9a27588e2c693

  • SHA256

    a540da5ac6c1b71a3ec69e3331e092f95b822679d0483c9435fa1a77085c6469

  • SHA512

    679345c300ba3cba7e942b1e5e6dfd1fb7eb667c1fcd3c791f2e0c3f90033277288b6b358c909271fd29f3c0bfabbfa84bafd39fad867e21eadfe7e6a4fea4e9

  • SSDEEP

    196608:VxVNwILlHT9VjzNq0TkzqvUkkeh5CrmsnH4QJ:v5LlHX00TWQhgDHL

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a540da5ac6c1b71a3ec69e3331e092f95b822679d0483c9435fa1a77085c6469.exe
    "C:\Users\Admin\AppData\Local\Temp\a540da5ac6c1b71a3ec69e3331e092f95b822679d0483c9435fa1a77085c6469.exe"
    1⤵
    • Loads dropped DLL
    PID:1060

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsd2ABA.tmp\ButtonLinker.dll
    Filesize

    7KB

    MD5

    dd85ac7d85c92dd0e3cc17dfd4890f54

    SHA1

    a128fb7a05965c1a9913c6f5e419e6c4c0a7d2fa

    SHA256

    27abd2a4fb1bf66add60221b52d061bbe24d2d21e13600725ff7a5c6c777b504

    SHA512

    e4ff8216c65110a9d156f37c2062acb53a72daa8af12dfc24278920d9e1a4083a81b1446759df75405b2da34c7bfb1afc33184feedd0aee4ed73f79fcbb1a8a1

  • \Users\Admin\AppData\Local\Temp\nsd2ABA.tmp\System.dll
    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\nsd2ABA.tmp\System.dll
    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • memory/1060-54-0x0000000075021000-0x0000000075023000-memory.dmp
    Filesize

    8KB