Analysis

  • max time kernel
    111s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:48

General

  • Target

    b2ab983ec8f26741677e95ba3f26c413288a865f8cc00e3a61067e8a42fb79fe.exe

  • Size

    2.8MB

  • MD5

    2aa4088717b62dab52cfb867e2b2bc3f

  • SHA1

    e0db44088e21f67c266ac3782f9507cdeb4d1e58

  • SHA256

    b2ab983ec8f26741677e95ba3f26c413288a865f8cc00e3a61067e8a42fb79fe

  • SHA512

    799266fc9856175804a7c7b94206d77babfc82d5796cfd526b7d9464c539e0a838bd64a26e1730ee9d0ac6528aed7f98f291dc7a394cb0dd8db9a3d397450f72

  • SSDEEP

    49152:dQK54yqINtkLBDHGyJZOoW12NprDVP0Osa3NB9bgT37MW5dUlgaw:dN5LqINmNzGyJZmwNprDRya3NH8nulk

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2ab983ec8f26741677e95ba3f26c413288a865f8cc00e3a61067e8a42fb79fe.exe
    "C:\Users\Admin\AppData\Local\Temp\b2ab983ec8f26741677e95ba3f26c413288a865f8cc00e3a61067e8a42fb79fe.exe"
    1⤵
    • Drops file in Drivers directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd /c rd "C:\Windows\system32\drivers\etcjb13F" /S /Q
      2⤵
        PID:4448

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3144-138-0x0000000000400000-0x00000000007C8000-memory.dmp

      Filesize

      3.8MB

    • memory/3144-133-0x0000000000400000-0x00000000007C8000-memory.dmp

      Filesize

      3.8MB

    • memory/3144-134-0x0000000000400000-0x00000000007C8000-memory.dmp

      Filesize

      3.8MB

    • memory/3144-135-0x0000000000400000-0x00000000007C8000-memory.dmp

      Filesize

      3.8MB

    • memory/3144-136-0x0000000000400000-0x00000000007C8000-memory.dmp

      Filesize

      3.8MB

    • memory/3144-137-0x0000000000400000-0x00000000007C8000-memory.dmp

      Filesize

      3.8MB

    • memory/3144-132-0x0000000000400000-0x00000000007C8000-memory.dmp

      Filesize

      3.8MB

    • memory/3144-139-0x0000000000400000-0x00000000007C8000-memory.dmp

      Filesize

      3.8MB

    • memory/3144-140-0x0000000000400000-0x00000000007C8000-memory.dmp

      Filesize

      3.8MB

    • memory/3144-141-0x0000000000400000-0x00000000007C8000-memory.dmp

      Filesize

      3.8MB

    • memory/3144-143-0x0000000000400000-0x00000000007C8000-memory.dmp

      Filesize

      3.8MB

    • memory/3144-144-0x0000000000400000-0x00000000007C8000-memory.dmp

      Filesize

      3.8MB

    • memory/4448-142-0x0000000000000000-mapping.dmp