Analysis

  • max time kernel
    157s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 08:30

General

  • Target

    e9f79516487ba2d1829967ce56b0378b12384d45fbed49b6d7e5fdebb32a1889.exe

  • Size

    5.1MB

  • MD5

    44df089c8500a8f51025ea6be2c811f1

  • SHA1

    dadac0448b465e933ca32af920860c7443ece429

  • SHA256

    e9f79516487ba2d1829967ce56b0378b12384d45fbed49b6d7e5fdebb32a1889

  • SHA512

    7fe777750d1b966046ea69774d5690dc152f5ae26e75b699cb763496e200eb9e81f93b6f31ca9eba86f39ff55ac3369232b0aee9aa9c8ab5cf2903315d6793d7

  • SSDEEP

    98304:vnA8a7QFfhdvDFbqoal2UYaoqTwd3ZZ6+QPZBs8Wz9HHg5X6HbJziguAq98G/wnf:vnA8cQhJNqoarY5pnPQPZYXtq9jwvfxl

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9f79516487ba2d1829967ce56b0378b12384d45fbed49b6d7e5fdebb32a1889.exe
    "C:\Users\Admin\AppData\Local\Temp\e9f79516487ba2d1829967ce56b0378b12384d45fbed49b6d7e5fdebb32a1889.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsyBAB9.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    0dc0cc7a6d9db685bf05a7e5f3ea4781

    SHA1

    5d8b6268eeec9d8d904bc9d988a4b588b392213f

    SHA256

    8e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c

    SHA512

    814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0

  • \Users\Admin\AppData\Local\Temp\nsyBAB9.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\nsyBAB9.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

  • memory/2020-54-0x00000000760B1000-0x00000000760B3000-memory.dmp

    Filesize

    8KB