Analysis

  • max time kernel
    41s
  • max time network
    102s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 07:39

General

  • Target

    ᰮﶹv3.0.exe

  • Size

    952KB

  • MD5

    28d322548a7f25e0d1551812dd8cab84

  • SHA1

    9e705638388d032e9e0f91037f7e57175a1cb80a

  • SHA256

    320141102e439b1ee028af89550990384b4583643ac989b82c40f250ac26d8ca

  • SHA512

    df24fa2f14f1f1976fe82e6ba4e57d4a0405f4842e802912355a80b2e61ab988e737658f251ec90d1b6651f0e1abb5f80b6ce883b653b7542557070253f5b576

  • SSDEEP

    12288:AaR8ma6AhFDVaqIlZmqoyWnfP6iDIcIlhTNU+EJFFVQLk77gbGG1QLk:2m3eDVa7lZmwa63lxWVQLkHsQLk

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ᰮﶹv3.0.exe
    "C:\Users\Admin\AppData\Local\Temp\ᰮﶹv3.0.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tem.vbs"
      2⤵
      • Deletes itself
      PID:1952

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tem.vbs
    Filesize

    204B

    MD5

    bf153b89117847171b6497371cff7ed2

    SHA1

    cf21f1ec33eb95cb10e6361ecdf5a7cd0f5b9494

    SHA256

    6e8b2c7f607fd7ab1475162b55258086bc9da7595e3c10d0f439b14754ca4a7b

    SHA512

    a02a597d51fe206c94d0a94bb3214d79359b7792786fcc56135e0f2b466ace2725f2ebfe8d172ebd30b46d7e27c6f11462e04de1a435806db44ecf0b13309cef

  • memory/1884-54-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB

  • memory/1884-55-0x0000000075571000-0x0000000075573000-memory.dmp
    Filesize

    8KB

  • memory/1884-57-0x0000000000400000-0x000000000050D000-memory.dmp
    Filesize

    1.1MB

  • memory/1952-56-0x0000000000000000-mapping.dmp