Analysis

  • max time kernel
    154s
  • max time network
    208s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:40

General

  • Target

    8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe

  • Size

    20KB

  • MD5

    8ed0aa8a61552b4cbd7c997894d5b3d8

  • SHA1

    4f67814d6ac59acbae651de6ef7e8bbac855f4b1

  • SHA256

    8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832

  • SHA512

    929f3f395cc2e0aec9234a21ab48505bdef1dea312aa3bdc8765182a9a24ade08113d20bbd7ef7179c5c81342520edc612344b436fde9b11288ee50021628863

  • SSDEEP

    384:CCdf0gjdiTpCrd+Ll2E204F1cQv8h4O7:tFdi4c8EAE4O7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe
    "C:\Users\Admin\AppData\Local\Temp\8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\vvhhh.exe
      "C:\Users\Admin\AppData\Local\Temp\vvhhh.exe"
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Suspicious use of UnmapMainImage
      PID:1688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\vvhhh.exe

    Filesize

    20KB

    MD5

    114c75c7c637b2fef87762c02680fa6b

    SHA1

    5a9fcb2308985c865eb617681bdcbc614e2402fd

    SHA256

    e1160aa4bc15b68431452a52b0d6d7e2ac52dc8a4911d4b7c9152478a51ec892

    SHA512

    120fdda5b047e25368826bc31b492f3f75ed2f35e1f1823267599e6b512e146cb8c9b56080d2b2194afb21ea8a5c6035b0f9977102344e4a269cbda67511e6ae

  • C:\Users\Admin\AppData\Local\Temp\vvhhh.exe

    Filesize

    20KB

    MD5

    114c75c7c637b2fef87762c02680fa6b

    SHA1

    5a9fcb2308985c865eb617681bdcbc614e2402fd

    SHA256

    e1160aa4bc15b68431452a52b0d6d7e2ac52dc8a4911d4b7c9152478a51ec892

    SHA512

    120fdda5b047e25368826bc31b492f3f75ed2f35e1f1823267599e6b512e146cb8c9b56080d2b2194afb21ea8a5c6035b0f9977102344e4a269cbda67511e6ae

  • \Users\Admin\AppData\Local\Temp\vvhhh.exe

    Filesize

    20KB

    MD5

    114c75c7c637b2fef87762c02680fa6b

    SHA1

    5a9fcb2308985c865eb617681bdcbc614e2402fd

    SHA256

    e1160aa4bc15b68431452a52b0d6d7e2ac52dc8a4911d4b7c9152478a51ec892

    SHA512

    120fdda5b047e25368826bc31b492f3f75ed2f35e1f1823267599e6b512e146cb8c9b56080d2b2194afb21ea8a5c6035b0f9977102344e4a269cbda67511e6ae

  • memory/1184-54-0x0000000075991000-0x0000000075993000-memory.dmp

    Filesize

    8KB

  • memory/1184-55-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1688-57-0x0000000000000000-mapping.dmp

  • memory/1688-62-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1688-63-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB