Analysis

  • max time kernel
    29s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:39

General

  • Target

    27c4c7392f237eb7ace02fbb6b56642bb0b86ef01d2129ffb0ccb68806ec33fb.exe

  • Size

    6.0MB

  • MD5

    7059cb830257b039491acf9ec9f9c302

  • SHA1

    ad8e912f6c2243e4a4ad06df95adb2da1c6381d7

  • SHA256

    27c4c7392f237eb7ace02fbb6b56642bb0b86ef01d2129ffb0ccb68806ec33fb

  • SHA512

    152c90fbf089c3e8a895eec9a2e06fa4e092a1c82be77c949a26dea33fa6d0963e685c7611435632888cb0541ed502c26736b105c48aeb08e8cfbb18a708c6a0

  • SSDEEP

    98304:GRXkPgFETKSzARKzEGusS3CvNmQnWFI1pAJGsq6kjRj7:uwUELAKzENsYC1mtw6NSjRf

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27c4c7392f237eb7ace02fbb6b56642bb0b86ef01d2129ffb0ccb68806ec33fb.exe
    "C:\Users\Admin\AppData\Local\Temp\27c4c7392f237eb7ace02fbb6b56642bb0b86ef01d2129ffb0ccb68806ec33fb.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 728
      2⤵
      • Program crash
      PID:1972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1960-54-0x0000000075D01000-0x0000000075D03000-memory.dmp

    Filesize

    8KB

  • memory/1960-55-0x0000000002720000-0x0000000003895000-memory.dmp

    Filesize

    17.5MB

  • memory/1960-56-0x0000000000400000-0x0000000000942000-memory.dmp

    Filesize

    5.3MB

  • memory/1960-57-0x0000000002720000-0x0000000003895000-memory.dmp

    Filesize

    17.5MB

  • memory/1960-58-0x0000000002720000-0x0000000003895000-memory.dmp

    Filesize

    17.5MB

  • memory/1960-59-0x0000000000400000-0x0000000000942000-memory.dmp

    Filesize

    5.3MB

  • memory/1960-60-0x0000000002720000-0x0000000003895000-memory.dmp

    Filesize

    17.5MB

  • memory/1960-63-0x0000000000400000-0x0000000000942000-memory.dmp

    Filesize

    5.3MB

  • memory/1960-64-0x0000000002720000-0x0000000003895000-memory.dmp

    Filesize

    17.5MB

  • memory/1972-62-0x0000000000000000-mapping.dmp