Analysis

  • max time kernel
    127s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:57

General

  • Target

    ADMSetup/ADMSetup_v1.9.0.5.exe

  • Size

    3.1MB

  • MD5

    cad96e26cf3060a9ce30df2156083df2

  • SHA1

    7241572f95358c020bee659ecec4c1864104d480

  • SHA256

    edfd335908f34e9b1c2d61f309c6b0dd02bfb5a1f24da875af2b9502175fb9bb

  • SHA512

    3f3bf32608c97d61287a5c5d6926427501721136b2d5aeb648a7d0a82239bd76523d158e39e4a8d08a071748c0c9ac762cdba505b866b8b0f27e5abe8a26e417

  • SSDEEP

    98304:DETMBhy6vPywA6yxVZ0c8HZ1b0Oi7iz2ic:DEZ6zAHxVZ0cgWus

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ADMSetup\ADMSetup_v1.9.0.5.exe
    "C:\Users\Admin\AppData\Local\Temp\ADMSetup\ADMSetup_v1.9.0.5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2012

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsj25FB.tmp\InstallOptions.dll
    Filesize

    14KB

    MD5

    6644004a780ffcf2474a697ad8c66a3b

    SHA1

    49bd0289c081d1c55a99cd63d526eb4120b6955c

    SHA256

    b05f147d9fc0e1854e66b5af734115737f6c0d82954e9fe86ad13e72e086215a

    SHA512

    b71e302269a532e9975a97e06e4846fce4c516358db89c7a4d3aff6fbe957db29c4b3924163aa251cc0f9221b841b519709627e46d2017ffc8094b545fc75444

  • \Users\Admin\AppData\Local\Temp\nsj25FB.tmp\System.dll
    Filesize

    11KB

    MD5

    ee98c1c5cb7a32248c9245d6eaaca651

    SHA1

    e9c69fe615217a4e1158a1fb015b48b25602aa13

    SHA256

    cdc62858888490db547c66bae1ba19d2c60d0e2175f01226c31919088761b5b9

    SHA512

    9871c034f7c384e3075e757d838cf0b6ad2e27296662531e2bbc3a39e9d83741cc5d7df919736365fa20574b4b75d025d9e4f5f79d9fee1e6351089ece8feb4b

  • memory/2012-54-0x0000000075D61000-0x0000000075D63000-memory.dmp
    Filesize

    8KB