Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:04

General

  • Target

    19c22a4ef415fc47c32bd6b351da57938c70574a2b7d223607c123743a07af9b.exe

  • Size

    227KB

  • MD5

    a6bb070d438a766d4966ce5ff0a57e0d

  • SHA1

    38daa2d784f17e3f1046c246bca874698ab65e9c

  • SHA256

    19c22a4ef415fc47c32bd6b351da57938c70574a2b7d223607c123743a07af9b

  • SHA512

    8a9757daad0c9456118f10b19cd5910f0b90391da02271a4cd11b2c159a3d1c16a7d6e2181178284f00358294397b9db4479a016aacc83ddc52606c5a9b163cc

  • SSDEEP

    6144:+9o7tHiKg02IwLgnIgRdS6rxKJksoddmwEVT9:6AHiKgHUd9xKJkuz9

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19c22a4ef415fc47c32bd6b351da57938c70574a2b7d223607c123743a07af9b.exe
    "C:\Users\Admin\AppData\Local\Temp\19c22a4ef415fc47c32bd6b351da57938c70574a2b7d223607c123743a07af9b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Windows\SysWOW64\PING.EXE
      "C:\Windows\System32\PING.EXE" 127.0.0.1 -n 1
      2⤵
      • Runs ping.exe
      PID:2032
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c if exist "C:\Users\Admin\AppData\Roaming\566bbee0f961ad71b54c3c2fd36db053.bin" del /f /q "C:\Users\Admin\AppData\Roaming\566bbee0f961ad71b54c3c2fd36db053.js"&exit
      2⤵
        PID:1752
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c if exist "C:\Users\Admin\AppData\Roaming\566bbee0f961ad71b54c3c2fd36db053.js" start wscript.exe //B //Nologo //T:360 "C:\Users\Admin\AppData\Roaming\566bbee0f961ad71b54c3c2fd36db053.js"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1776
        • C:\Windows\SysWOW64\wscript.exe
          wscript.exe //B //Nologo //T:360 "C:\Users\Admin\AppData\Roaming\566bbee0f961ad71b54c3c2fd36db053.js"
          3⤵
          • Blocklisted process makes network request
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:1880
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Roaming\566bbee0f961ad71b54c3c2fd36db053.cmd" "
            4⤵
              PID:1472
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
        1⤵
        • Suspicious use of FindShellTrayWindow
        PID:952

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Remote System Discovery

      1
      T1018

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\566bbee0f961ad71b54c3c2fd36db053.cmd
        Filesize

        125KB

        MD5

        3c2de6d4c2dfecf633e801fd73fdabc4

        SHA1

        a0d0b824571d9cc621e01c06319d6e546a6a0e25

        SHA256

        ccd2e89fe77045544f6da21250535cc61c0e5a4f5702a4b8ba7930549a8fed42

        SHA512

        18b4b52f02f65bb1a11c01664b76f27dc0a9ab610802ed66fccc36e2f174eaabb6fe746689437191d7c9e7e06eee5103be0eed5bbd4b00ec39b97611d4ad7d49

      • C:\Users\Admin\AppData\Roaming\566bbee0f961ad71b54c3c2fd36db053.jpg
        Filesize

        68KB

        MD5

        fb5e07870199d63c34448b68a84912ee

        SHA1

        b6e46748c5c5a5d902e20f6e2d45064d3ca4050e

        SHA256

        03d233031c6d3f6293d82c14e81334935c43a8651d619de4dcdca9dd20e86ffa

        SHA512

        4c6b8be2710fffff3c3a58bc8d3f803e11308a68e4513f8ffe625d7436d242c6c71203c5b2b6b0b738754bdadbb2e97d6933fb7a10a5dc366ababe8e03250c65

      • C:\Users\Admin\AppData\Roaming\566bbee0f961ad71b54c3c2fd36db053.js
        Filesize

        860B

        MD5

        12558d0bf7d69db70988530eafffeb53

        SHA1

        e594eacae5147c953f4b57d3ed3449a7699e3078

        SHA256

        4f2c8969cd573fc8408df3449c88ae1c7f34afa2a176a8fc1e5a68ed3dcf4fde

        SHA512

        b88ea05c76beb9ba83640df2991b1990ea396550b71a7bfc10198667f7e537539fc68836be302d276aa1a6d2cb2b34aedc3f01c550cde54ae2857136a63d2f03

      • memory/868-54-0x0000000075131000-0x0000000075133000-memory.dmp
        Filesize

        8KB

      • memory/1472-63-0x0000000000000000-mapping.dmp
      • memory/1752-57-0x0000000000000000-mapping.dmp
      • memory/1776-58-0x0000000000000000-mapping.dmp
      • memory/1880-59-0x0000000000000000-mapping.dmp
      • memory/2032-55-0x0000000000000000-mapping.dmp