Analysis

  • max time kernel
    95s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2022, 18:26

General

  • Target

    a94580c60e3a7fefc2531251d3920959baf0f837974a5b1839811cfe0e100513.exe

  • Size

    762KB

  • MD5

    5248363663a3870aaf804f823a8c16ba

  • SHA1

    addd9ab47d25f829bbc461d841d63a377fbf0589

  • SHA256

    a94580c60e3a7fefc2531251d3920959baf0f837974a5b1839811cfe0e100513

  • SHA512

    c1a0aa2e693605be8dc4c6961a2a03c5cb46d54545f4c2ed9b81720a6f2b6cc3b66a54ededa4a9800f673d01a853c8fa7b34de6618e49dbc7c365e825b293aeb

  • SSDEEP

    12288:8AHiKgH2vkEg4qQ49lzWK134AR0WuYGM7wxa9f:8ACK3JAWK13nuW1Au

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a94580c60e3a7fefc2531251d3920959baf0f837974a5b1839811cfe0e100513.exe
    "C:\Users\Admin\AppData\Local\Temp\a94580c60e3a7fefc2531251d3920959baf0f837974a5b1839811cfe0e100513.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Windows\SysWOW64\PING.EXE
      "C:\Windows\System32\PING.EXE" 127.0.0.1 -n 1
      2⤵
      • Runs ping.exe
      PID:1612
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c if exist "C:\Users\Admin\AppData\Roaming\r1EB20u.jpg" "C:\Users\Admin\AppData\Roaming\r1EB20u.jpg"
      2⤵
        PID:268
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c if exist "C:\Users\Admin\AppData\Roaming\rtv.bin" del /f /q "C:\Users\Admin\AppData\Roaming\ws.js"&exit
        2⤵
          PID:1848
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c if exist "C:\Users\Admin\AppData\Roaming\ws.js" start wscript.exe //B //Nologo //T:360 "C:\Users\Admin\AppData\Roaming\ws.js"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1720
          • C:\Windows\SysWOW64\wscript.exe
            wscript.exe //B //Nologo //T:360 "C:\Users\Admin\AppData\Roaming\ws.js"
            3⤵
            • Blocklisted process makes network request
            • Modifies system certificate store
            • Suspicious use of WriteProcessMemory
            PID:684
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Roaming\sysfile.cmd" "
              4⤵
                PID:1628
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
          1⤵
          • Suspicious use of FindShellTrayWindow
          PID:1692

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\r1EB20u.jpg

          Filesize

          124KB

          MD5

          5acc8fc1a2e6dc797704068df189bab9

          SHA1

          93fdfb1c32572c8c94bc04e1472d191e8fd75745

          SHA256

          fd9eec3e6400318f912defe578e2e84567b187bb30417671fa8e4ec21c0f7548

          SHA512

          c6b07779abc66d0f73dfc75b304a76f3825767fc77495c1b6436fed499566c612c5c569917ac9e8f3831059673902c2a57b1c18f392735c44e87340fd06d8e4e

        • C:\Users\Admin\AppData\Roaming\sysfile.cmd

          Filesize

          125KB

          MD5

          f681b2729b4c1acbba3b82f682032a14

          SHA1

          b7eddf2138f313c38e259eda22f990b42b8949ec

          SHA256

          d38980772bcb6aa20188f99738c9da5d80e3aefea243e4c1a32838c869aa5215

          SHA512

          7ce3cd2009eb442fa74759988213aeb85a814519574c5a91b8cc6b29f366025db5a5b480d69a7d8b7305052661ef6266c19f54368ce5cbb65073f3f08b775378

        • C:\Users\Admin\AppData\Roaming\ws.js

          Filesize

          952B

          MD5

          76ba79e64fb59a3f529491b4d87a1e3b

          SHA1

          ac1423a8c95f0081e230c19cdc17b6bc7b9b21f9

          SHA256

          6576f649253d6b85d33bea91fa2b72f8a603567ab393ea09d9d877619b83459f

          SHA512

          68b75d5ebe265f215680506f8142810a377ca8d5dae583d18bf2b5af94f8800729830ac82d3f52907925b9a58db4dbb606888d2072bcf6ca319dc83dd385e1ca

        • memory/944-54-0x0000000075B61000-0x0000000075B63000-memory.dmp

          Filesize

          8KB