Analysis

  • max time kernel
    92s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 20:05

General

  • Target

    4b3cb1df0dd0e802c00173210e497567004bb5c9f3b30e4f7bba09678f32c28a.exe

  • Size

    760KB

  • MD5

    4f86b982774c2a1dc3e4631c11604572

  • SHA1

    cc20f1ee9baff48885334730056a69b530a81f3d

  • SHA256

    4b3cb1df0dd0e802c00173210e497567004bb5c9f3b30e4f7bba09678f32c28a

  • SHA512

    17d4e343ec44b22a98200e7d3689b618c5ad050b7dc481869ae354663dda9d4e95949040d3ef2a004c87177ded38591fd4b1b5267edee23bdb6bbbeea1430b41

  • SSDEEP

    12288:no5GBHD297ujJxcmdXkmp9WrXOFXwG//tHCDBLO3EmiSRKQMMpge5eDq/qI:no50C97ujJfBHm8P/lCd6riubge5eu/d

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 38 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b3cb1df0dd0e802c00173210e497567004bb5c9f3b30e4f7bba09678f32c28a.exe
    "C:\Users\Admin\AppData\Local\Temp\4b3cb1df0dd0e802c00173210e497567004bb5c9f3b30e4f7bba09678f32c28a.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4344

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4344-133-0x0000000000400000-0x000000000060E000-memory.dmp

    Filesize

    2.1MB

  • memory/4344-132-0x0000000000400000-0x000000000060E000-memory.dmp

    Filesize

    2.1MB

  • memory/4344-134-0x0000000000400000-0x000000000060E000-memory.dmp

    Filesize

    2.1MB

  • memory/4344-135-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-138-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-137-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-140-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-139-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-142-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-144-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-146-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-148-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-150-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-152-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-154-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-156-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-158-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-160-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-162-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-164-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-166-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-168-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-170-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-172-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-174-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-176-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-178-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-180-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/4344-181-0x00000000025B0000-0x00000000025ED000-memory.dmp

    Filesize

    244KB

  • memory/4344-184-0x00000000025B0000-0x00000000025ED000-memory.dmp

    Filesize

    244KB

  • memory/4344-183-0x00000000025B0000-0x00000000025ED000-memory.dmp

    Filesize

    244KB

  • memory/4344-185-0x00000000025B0000-0x00000000025ED000-memory.dmp

    Filesize

    244KB

  • memory/4344-186-0x00000000025B0000-0x00000000025ED000-memory.dmp

    Filesize

    244KB

  • memory/4344-188-0x00000000025B0000-0x00000000025ED000-memory.dmp

    Filesize

    244KB

  • memory/4344-190-0x00000000025B0000-0x00000000025ED000-memory.dmp

    Filesize

    244KB

  • memory/4344-192-0x00000000025B0000-0x00000000025ED000-memory.dmp

    Filesize

    244KB

  • memory/4344-194-0x00000000025B0000-0x00000000025ED000-memory.dmp

    Filesize

    244KB

  • memory/4344-196-0x00000000025B0000-0x00000000025ED000-memory.dmp

    Filesize

    244KB

  • memory/4344-273-0x00000000025B0000-0x00000000025ED000-memory.dmp

    Filesize

    244KB

  • memory/4344-274-0x0000000002710000-0x000000000274D000-memory.dmp

    Filesize

    244KB

  • memory/4344-275-0x0000000000400000-0x000000000060E000-memory.dmp

    Filesize

    2.1MB

  • memory/4344-276-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB