Analysis

  • max time kernel
    22s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 04:15

General

  • Target

    abe72a879a5eee93263ba3070fc8fb2a6f308d3d71cf0c8b6002ac0b335cb825.exe

  • Size

    167KB

  • MD5

    20b76a550c9cf8022a31be2231443446

  • SHA1

    4136330392f4c0f1c5b6d2c87f73dc1a65b2a892

  • SHA256

    abe72a879a5eee93263ba3070fc8fb2a6f308d3d71cf0c8b6002ac0b335cb825

  • SHA512

    ba9f5aaa360baff1742567883daaf2bfe45f38e5c559365bf2c7c0ba6deeb4e31f845e6e620a96e86deee194bb947b4d1baa993c70265c141e2b4e83fdb12c21

  • SSDEEP

    3072:UeXYyLtUl2IVyGwpGQQR2VBC67aT6dsPIkvc6wc:UeXhL+UJJ37a6dsAkkQ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abe72a879a5eee93263ba3070fc8fb2a6f308d3d71cf0c8b6002ac0b335cb825.exe
    "C:\Users\Admin\AppData\Local\Temp\abe72a879a5eee93263ba3070fc8fb2a6f308d3d71cf0c8b6002ac0b335cb825.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Local\Temp\\389cd74e-7125-4a1e-b32e-c6b81d18a38f\\progress.hta
      2⤵
      • Modifies Internet Explorer settings
      PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\389cd74e-7125-4a1e-b32e-c6b81d18a38f\loader.gif

    Filesize

    1KB

    MD5

    e88ebd85dd56110ac6ea93fe0922988e

    SHA1

    684a31d864d33ff736234c41ac4e8d2c7f90d5ae

    SHA256

    379d1b0948f8e06366e7bcd197c848c0cc783787792f2224f98c16b974d920eb

    SHA512

    211b0760c9a887fc13c479617daeb6d5b6ee0ccd06c214967abd3e1f14204f72e34a6dd5eb778a9fc6ac7fc8bd63bdef80b347abab97becda16924cb3e164dc7

  • C:\Users\Admin\AppData\Local\Temp\389cd74e-7125-4a1e-b32e-c6b81d18a38f\progress.hta

    Filesize

    1KB

    MD5

    580c0c72b17ffcb9a626356f7393d89c

    SHA1

    7a5e408abd57f8e2cc6f4fdd7f116fac04eb8a83

    SHA256

    879b0caf66aca0fc0f9558a09d86480a64bf34cacd5094a572d779a6d65bf00b

    SHA512

    9fc56f0916b75e03bca8654a2243fc0063a5baece46f648d67cb6f1876aa6aedebc55c1f1458baf2b2883ab1ec91973b6099918aae3269b91b76e627d6b19dac

  • memory/916-54-0x0000000076091000-0x0000000076093000-memory.dmp

    Filesize

    8KB