Analysis

  • max time kernel
    144s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:02

General

  • Target

    99cdbdc625bf76651fd4e20ab57cda4d51e3edcbd164ef30dec6639b2efd1d7d.exe

  • Size

    19KB

  • MD5

    4a42cf14c0b527c279bbc2e0c0d85830

  • SHA1

    705e83da26f6608f12b23fe750667eff30c69947

  • SHA256

    99cdbdc625bf76651fd4e20ab57cda4d51e3edcbd164ef30dec6639b2efd1d7d

  • SHA512

    2835b4ba02eb2d2fc4aa391cd5221775951762b8ea730ccda51f63610dcc82bfefd44ad8eb1a6753a3f6d1d0473ca5b8d66c5ce76afcf9c69dce51e957fcf2cb

  • SSDEEP

    192:uXy4Rmi6ENEAk5Vgg5GQ8b1wN/A9iZbIcFHrY9W14APTK7YySJABJN55Ovr:uX5vK5D78BwN/xrF8PMcYySJkJNcr

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99cdbdc625bf76651fd4e20ab57cda4d51e3edcbd164ef30dec6639b2efd1d7d.exe
    "C:\Users\Admin\AppData\Local\Temp\99cdbdc625bf76651fd4e20ab57cda4d51e3edcbd164ef30dec6639b2efd1d7d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\realupdater.exe
      "C:\Users\Admin\AppData\Local\Temp\realupdater.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1756

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\realupdater.exe
    Filesize

    20KB

    MD5

    bfa5265997b504ef2729946c464439fb

    SHA1

    a1960db24b7df15d75dcc86fe0807ad6bc39d795

    SHA256

    b45adc3be9423c06e39b47545697bd73b0fead9d84d80cdf43ac1ed83f4fe4b1

    SHA512

    bd50618b70497758f1273c6d4a9c6f48d59c1d1c02485e5a54934c29f944868157c79d133be24ae9bd54da2ce6f1012adda3989645f90fe06da91c65fbcda42d

  • C:\Users\Admin\AppData\Local\Temp\realupdater.exe
    Filesize

    20KB

    MD5

    bfa5265997b504ef2729946c464439fb

    SHA1

    a1960db24b7df15d75dcc86fe0807ad6bc39d795

    SHA256

    b45adc3be9423c06e39b47545697bd73b0fead9d84d80cdf43ac1ed83f4fe4b1

    SHA512

    bd50618b70497758f1273c6d4a9c6f48d59c1d1c02485e5a54934c29f944868157c79d133be24ae9bd54da2ce6f1012adda3989645f90fe06da91c65fbcda42d

  • \Users\Admin\AppData\Local\Temp\realupdater.exe
    Filesize

    20KB

    MD5

    bfa5265997b504ef2729946c464439fb

    SHA1

    a1960db24b7df15d75dcc86fe0807ad6bc39d795

    SHA256

    b45adc3be9423c06e39b47545697bd73b0fead9d84d80cdf43ac1ed83f4fe4b1

    SHA512

    bd50618b70497758f1273c6d4a9c6f48d59c1d1c02485e5a54934c29f944868157c79d133be24ae9bd54da2ce6f1012adda3989645f90fe06da91c65fbcda42d

  • memory/1628-54-0x00000000761F1000-0x00000000761F3000-memory.dmp
    Filesize

    8KB

  • memory/1756-56-0x0000000000000000-mapping.dmp