Analysis

  • max time kernel
    165s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 03:58

General

  • Target

    f4330ede106b5c29787d15767163a0f3dd751c3382204d2369efc71116cad46b.exe

  • Size

    20KB

  • MD5

    abeec6065e144c428718311610f6798e

  • SHA1

    4da90dc9055034789f2c1747bc107188ada293ca

  • SHA256

    f4330ede106b5c29787d15767163a0f3dd751c3382204d2369efc71116cad46b

  • SHA512

    907a2e56cf8c1fe9c8a06855f5208744f3bc3509e24467eac2d4c4f5fbbab76fadbdbf383d670d1b89bc3771ccd6faafeb1c76722347672efedb07a6b9414e20

  • SSDEEP

    384:SjIAaIbL6kbkxRIyel11RlPOBJrXXfif3Y97H9:Ss9IJAxRIy++rXXfq+9

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4330ede106b5c29787d15767163a0f3dd751c3382204d2369efc71116cad46b.exe
    "C:\Users\Admin\AppData\Local\Temp\f4330ede106b5c29787d15767163a0f3dd751c3382204d2369efc71116cad46b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\AppData\Local\Temp\foxupdater.exe
      "C:\Users\Admin\AppData\Local\Temp\foxupdater.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1208

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\foxupdater.exe

    Filesize

    21KB

    MD5

    f1812546094c8c0dae574bf2435be73a

    SHA1

    c587d7167d960d82dc21c3958cff42813d9f3aba

    SHA256

    548b73cc2af4f3417dcdeb7251407cf162af1e63664fe7bf07debeaf8de27886

    SHA512

    7be2162058e860e62e3c78b1484fd7415d0ec3516fb6f7f8ce8114fad6d11f85504e3f6d8e701b9a5ed46de8c637c3e7a69b484116265f9b05a9344c64dda3dd

  • C:\Users\Admin\AppData\Local\Temp\foxupdater.exe

    Filesize

    21KB

    MD5

    f1812546094c8c0dae574bf2435be73a

    SHA1

    c587d7167d960d82dc21c3958cff42813d9f3aba

    SHA256

    548b73cc2af4f3417dcdeb7251407cf162af1e63664fe7bf07debeaf8de27886

    SHA512

    7be2162058e860e62e3c78b1484fd7415d0ec3516fb6f7f8ce8114fad6d11f85504e3f6d8e701b9a5ed46de8c637c3e7a69b484116265f9b05a9344c64dda3dd

  • \Users\Admin\AppData\Local\Temp\foxupdater.exe

    Filesize

    21KB

    MD5

    f1812546094c8c0dae574bf2435be73a

    SHA1

    c587d7167d960d82dc21c3958cff42813d9f3aba

    SHA256

    548b73cc2af4f3417dcdeb7251407cf162af1e63664fe7bf07debeaf8de27886

    SHA512

    7be2162058e860e62e3c78b1484fd7415d0ec3516fb6f7f8ce8114fad6d11f85504e3f6d8e701b9a5ed46de8c637c3e7a69b484116265f9b05a9344c64dda3dd

  • memory/1208-56-0x0000000000000000-mapping.dmp

  • memory/1792-54-0x0000000074DA1000-0x0000000074DA3000-memory.dmp

    Filesize

    8KB