Analysis

  • max time kernel
    41s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:03

General

  • Target

    f62aeeb494c19159f77d6b86734d9c7f08e707eb2370a4a7fdeefe97d6f7dbaa.exe

  • Size

    227KB

  • MD5

    e2335a973c55b516a4c75a4c69b417c2

  • SHA1

    30ff1132c6f53c999db664f3b0c60d7828ace515

  • SHA256

    f62aeeb494c19159f77d6b86734d9c7f08e707eb2370a4a7fdeefe97d6f7dbaa

  • SHA512

    1f1e271ba8d7a9edff494a1b64f2a7f99c39ccab94552680308f6acc862c19a0a492f0f88954ff9d8c04dfe759c62ad151454e48b46ad25a0e998f4b3397b7de

  • SSDEEP

    6144:H9o7tHiKg02IwLgnIgRdS6+0KJksoddmwEVTy:dAHiKgHcdg0KJkuzy

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f62aeeb494c19159f77d6b86734d9c7f08e707eb2370a4a7fdeefe97d6f7dbaa.exe
    "C:\Users\Admin\AppData\Local\Temp\f62aeeb494c19159f77d6b86734d9c7f08e707eb2370a4a7fdeefe97d6f7dbaa.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Windows\SysWOW64\PING.EXE
      "C:\Windows\System32\PING.EXE" 127.0.0.1 -n 1
      2⤵
      • Runs ping.exe
      PID:1708
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c if exist "C:\Users\Admin\AppData\Roaming\1881795ffa4793d2fd6056125afe580c.bin" del /f /q "C:\Users\Admin\AppData\Roaming\1881795ffa4793d2fd6056125afe580c.js"&exit
      2⤵
        PID:668
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c if exist "C:\Users\Admin\AppData\Roaming\1881795ffa4793d2fd6056125afe580c.js" start wscript.exe //B //Nologo //T:360 "C:\Users\Admin\AppData\Roaming\1881795ffa4793d2fd6056125afe580c.js"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:576
        • C:\Windows\SysWOW64\wscript.exe
          wscript.exe //B //Nologo //T:360 "C:\Users\Admin\AppData\Roaming\1881795ffa4793d2fd6056125afe580c.js"
          3⤵
          • Blocklisted process makes network request
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Roaming\1881795ffa4793d2fd6056125afe580c.cmd" "
            4⤵
              PID:1068
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
        1⤵
        • Suspicious use of FindShellTrayWindow
        PID:2044

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Remote System Discovery

      1
      T1018

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\1881795ffa4793d2fd6056125afe580c.cmd
        Filesize

        125KB

        MD5

        444b3e0250fdc892e6a745b115f79ae9

        SHA1

        85e1502bfdbbf4ee292ae8a9df56a74c0aac4a8f

        SHA256

        d035dd31971a16a0ec8dc6c8c6baf00bd4346e843d697ae3aed32b81dd72e672

        SHA512

        3915640831d2e0d3fd9ed1d641f906c4f71a46f77f55a434add29bf5fbaa7a8f8c8837b7638377ccec58479d7b86d1e8af36ef156415a10d25308eee5d73bbb6

      • C:\Users\Admin\AppData\Roaming\1881795ffa4793d2fd6056125afe580c.jpg
        Filesize

        68KB

        MD5

        fb5e07870199d63c34448b68a84912ee

        SHA1

        b6e46748c5c5a5d902e20f6e2d45064d3ca4050e

        SHA256

        03d233031c6d3f6293d82c14e81334935c43a8651d619de4dcdca9dd20e86ffa

        SHA512

        4c6b8be2710fffff3c3a58bc8d3f803e11308a68e4513f8ffe625d7436d242c6c71203c5b2b6b0b738754bdadbb2e97d6933fb7a10a5dc366ababe8e03250c65

      • C:\Users\Admin\AppData\Roaming\1881795ffa4793d2fd6056125afe580c.js
        Filesize

        862B

        MD5

        ab0c4dcd9c94f9b965beaf99615ef383

        SHA1

        3dbf92b522955119ef5ac02de626d0f3d70aa717

        SHA256

        1c3a7fa85db82b3ec4ea0625c3bda096ce6dd4f0d32cceca99ea3959280ca1a8

        SHA512

        262e3b836b51403755d9cd6500328dccb2b7bf61542c9d8c8f988907bc5c9fdda5060ff7e17e5d488240015ec4ac35f4fc01aa524f5af7180b52eef3be63c230

      • memory/576-58-0x0000000000000000-mapping.dmp
      • memory/668-57-0x0000000000000000-mapping.dmp
      • memory/1012-54-0x00000000763F1000-0x00000000763F3000-memory.dmp
        Filesize

        8KB

      • memory/1068-63-0x0000000000000000-mapping.dmp
      • memory/1536-59-0x0000000000000000-mapping.dmp
      • memory/1708-55-0x0000000000000000-mapping.dmp