Analysis

  • max time kernel
    299s
  • max time network
    367s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 16:37

General

  • Target

    88c6e8b9765435d45271ad1422a82c70760c15116f3ed32277c879bae1529eeb.exe

  • Size

    253KB

  • MD5

    bc413cd7fb642e045f9f33847223c9bd

  • SHA1

    b861734176811d0938e7cb62225d217a86cdc7b4

  • SHA256

    88c6e8b9765435d45271ad1422a82c70760c15116f3ed32277c879bae1529eeb

  • SHA512

    3fb07c1df69b865d312df7c886ac723c4a20e562f254253594ee27bb8165ad38199d36df4e377770859df09ca6083f3adb1dc24bed9175bfb49fe32cb5566c55

  • SSDEEP

    3072:EtAcb+inTJscH6KkT0uXJOYokNbQaRP/HdyPZ39po6ybO3NVJCkt4oaFrh3kWsl/:EI2KMEOYoKG3bfybODJtvaFuzl/

Malware Config

Signatures

  • CryptOne packer 3 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88c6e8b9765435d45271ad1422a82c70760c15116f3ed32277c879bae1529eeb.exe
    "C:\Users\Admin\AppData\Local\Temp\88c6e8b9765435d45271ad1422a82c70760c15116f3ed32277c879bae1529eeb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3276
    • C:\Users\Admin\AppData\Local\Temp\88c6e8b9765435d45271ad1422a82c70760c15116f3ed32277c879bae1529eeb.exe
      "C:\Users\Admin\AppData\Local\Temp\88c6e8b9765435d45271ad1422a82c70760c15116f3ed32277c879bae1529eeb.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\SysWOW64\calc.exe
        "C:\Windows\SysWOW64\calc.exe"
        3⤵
          PID:3116
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\SysWOW64\svchost.exe"
          3⤵
          • Adds Run key to start application
          • Enumerates connected drives
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3196
          • C:\Windows\SysWOW64\mspaint.exe
            "C:\Windows\SysWOW64\mspaint.exe"
            4⤵
              PID:2124

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2008-133-0x0000000000000000-mapping.dmp
      • memory/2008-134-0x0000000000400000-0x0000000000429000-memory.dmp
        Filesize

        164KB

      • memory/2008-139-0x0000000000400000-0x0000000000429000-memory.dmp
        Filesize

        164KB

      • memory/2124-138-0x0000000000000000-mapping.dmp
      • memory/3116-137-0x0000000000000000-mapping.dmp
      • memory/3196-136-0x0000000000000000-mapping.dmp
      • memory/3196-140-0x0000000000B80000-0x0000000000BA9000-memory.dmp
        Filesize

        164KB

      • memory/3276-132-0x00000000001C0000-0x00000000001D4000-memory.dmp
        Filesize

        80KB