Analysis

  • max time kernel
    151s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 13:33

General

  • Target

    6fdd97ca703c12628b3eb0cb3a0bed5daf10c76a1619613c563aa07cc8f63665.exe

  • Size

    148KB

  • MD5

    33acba5bc6dc7200bbcbf5528a392b7b

  • SHA1

    80838a9c87c5436eb95e9934d9dd6ad87784541d

  • SHA256

    6fdd97ca703c12628b3eb0cb3a0bed5daf10c76a1619613c563aa07cc8f63665

  • SHA512

    f6dc9defe54cbcbc03c6d8fac5eaea2d1ffc2034c59868b7dbc2ea8fa8b18ab7bf3e161a6d110fac562f93a4009e960e7bdea9abec0b4147b7396f479ebd6642

  • SSDEEP

    3072:4RQe3L7SPI8SxLDRuCX+iEuegzWn3gRA2ori:4RQu7ohSVA+EuLaONoe

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fdd97ca703c12628b3eb0cb3a0bed5daf10c76a1619613c563aa07cc8f63665.exe
    "C:\Users\Admin\AppData\Local\Temp\6fdd97ca703c12628b3eb0cb3a0bed5daf10c76a1619613c563aa07cc8f63665.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\d28r8SLQwI8a88x.exe.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Users\Admin\AppData\Local\Temp\d28r8SLQwI8a88x.exe
        "C:\Users\Admin\AppData\Local\Temp\d28r8SLQwI8a88x.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:588
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Windows\20221124\H5NMDty8QkW88bPG\DownFiles.exe.bat" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:520
          • C:\Windows\20221124\H5NMDty8QkW88bPG\DownFiles.exe
            "C:\Windows\20221124\H5NMDty8QkW88bPG\DownFiles.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious use of SetWindowsHookEx
            PID:1272
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Windows\20221124\Sxs8C8W2Nne8ruRV\script\script.exe.bat" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1580
          • C:\Windows\20221124\Sxs8C8W2Nne8ruRV\script\script.exe
            "C:\Windows\20221124\Sxs8C8W2Nne8ruRV\script\script.exe"
            5⤵
            • Executes dropped EXE
            PID:692
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Windows\20221124\yJbYYlr2CCbq558m\smss.exe.bat" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1912
          • C:\Windows\20221124\yJbYYlr2CCbq558m\smss.exe
            "C:\Windows\20221124\yJbYYlr2CCbq558m\smss.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1684
            • C:\Windows\SysWOW64\reg.exe
              reg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "flashget" /d "c:\windows\20221124\yjbyylr2ccbq558m\smss.exe " /f
              6⤵
              • Adds Run key to start application
              PID:920
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\d28r8SLQwI8a88x.exe.bat" "
          4⤵
            PID:1192
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\6fdd97ca703c12628b3eb0cb3a0bed5daf10c76a1619613c563aa07cc8f63665.exe.bat" "
        2⤵
        • Deletes itself
        PID:1112

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6fdd97ca703c12628b3eb0cb3a0bed5daf10c76a1619613c563aa07cc8f63665.exe.bat
      Filesize

      525B

      MD5

      0655f0b8663745e1751b0e4d8d0ec644

      SHA1

      682760597b10726dee68e95fd2421a1e76a11d87

      SHA256

      0c42e52dde6c45cc49d48b668bb2221c980726a228c1fc15eb0e4dd69a17af8c

      SHA512

      7eaee8dd4241cdb385356f0869497bae240fca2be74cc50acbbed2acd3749fd1d3078e629749950ae2890a0f43416c101507f47f6aceb624beafe81446108b85

    • C:\Users\Admin\AppData\Local\Temp\d28r8SLQwI8a88x.exe
      Filesize

      125KB

      MD5

      ff6177534593a05bf753480352e30067

      SHA1

      69e9c9b8a94390b7d7639dfb21022247002ad285

      SHA256

      9b1810688f64818a3b1e6e9d0c292cc25f0e13ddd8b5a29d7f895316c0298d84

      SHA512

      9e6b2e618adfbf2e1d678c6d0c7d560517a3004e598da6623a3d56445ded1a6fe97524fbeccc8c5ca954b0f3b5e57530424423a0640fbe4257f405d634ab594b

    • C:\Users\Admin\AppData\Local\Temp\d28r8SLQwI8a88x.exe
      Filesize

      125KB

      MD5

      ff6177534593a05bf753480352e30067

      SHA1

      69e9c9b8a94390b7d7639dfb21022247002ad285

      SHA256

      9b1810688f64818a3b1e6e9d0c292cc25f0e13ddd8b5a29d7f895316c0298d84

      SHA512

      9e6b2e618adfbf2e1d678c6d0c7d560517a3004e598da6623a3d56445ded1a6fe97524fbeccc8c5ca954b0f3b5e57530424423a0640fbe4257f405d634ab594b

    • C:\Users\Admin\AppData\Local\Temp\d28r8SLQwI8a88x.exe.bat
      Filesize

      329B

      MD5

      9c1b12c6455e1e5ed58f23dcc8853da8

      SHA1

      0c6585e40d5adc82fa13583441fd59fa237a9e3e

      SHA256

      a32f21c90020581261d3255540038915f4bbc741465884bc3d50b17db6c5ad6d

      SHA512

      c5303ab1247d83016141356e984700e1f5486bd4eaf6d8b693dcce4ec3e77d624dd7092d32878cc9b97724279e089485d9cf79e10cba4bf329e2b2e1632b0ea6

    • C:\Users\Admin\AppData\Local\Temp\d28r8SLQwI8a88x.exe.bat
      Filesize

      207B

      MD5

      ba19bd5a8b526c51c00cee79fb3a4f9f

      SHA1

      d5ca84c0d84a044211b8c942730ad49b026388ec

      SHA256

      89e71de128fb28222fbdbd26840f20bdddab5a59faf9369b39e90cac3803541c

      SHA512

      668d02f853951bcdaa8e5560cb5cf1aff172913465f55b6ffa9401ab82004cce4773179f7d3cd5929febe715eebe246d81a32a0216637bd99328bf0488ffec11

    • C:\Windows\20221124\H5NMDty8QkW88bPG\DownFiles.exe
      Filesize

      44KB

      MD5

      efbbd019efdd4af36da57cdae9553db2

      SHA1

      135afd51b152d44ee2f2c32a9d6fba1ae9a3d547

      SHA256

      11ec2a51ff5bf8b7e9c5a66a73fc10370c005fd4094b6522a2a0042f8683a2e8

      SHA512

      ff970d6780562820f98e083ac0e9af64582a76c4fe31392316cf9f925a70e122e80b24417187e83149d9c39391a017d09eb4603f81db49e809b31463557e6414

    • C:\Windows\20221124\H5NMDty8QkW88bPG\DownFiles.exe
      Filesize

      44KB

      MD5

      efbbd019efdd4af36da57cdae9553db2

      SHA1

      135afd51b152d44ee2f2c32a9d6fba1ae9a3d547

      SHA256

      11ec2a51ff5bf8b7e9c5a66a73fc10370c005fd4094b6522a2a0042f8683a2e8

      SHA512

      ff970d6780562820f98e083ac0e9af64582a76c4fe31392316cf9f925a70e122e80b24417187e83149d9c39391a017d09eb4603f81db49e809b31463557e6414

    • C:\Windows\20221124\H5NMDty8QkW88bPG\DownFiles.exe.bat
      Filesize

      198B

      MD5

      23317de6ca58e05632073492f9779ee9

      SHA1

      d81f856f5fbeb1c51d7796788fd1c29ad8a01ae4

      SHA256

      3ae66904fc55937ac6ebd7779fe3186639a1a2487ecb694d9a64ce05697f19bd

      SHA512

      6618cdd3d0eae3314e16bea0d52883fcf702fa6c246accf914e87ee4240e78f8058183f0470fbd1b62eab3bcdbc7cd2fbcd0b63fe8b4dfe38aa29286114bfb0a

    • C:\Windows\20221124\Sxs8C8W2Nne8ruRV\script\script.exe
      Filesize

      14KB

      MD5

      3dcd78c7a89db1d3203982b46802c9c0

      SHA1

      2795ad8b0083111f8a28534a12cb9cdb5a689a53

      SHA256

      79999072a577af5028f1b6bca397a0320850495b4d0f203704e4be4ba3554f36

      SHA512

      47dbec94a55bdc33097827f302850e6653cc86794c5e942697f8ccd0ee03b20209242712b4b05e6fccdf4ac8359540e35af519bfdff44766ea4483c7b0bd98af

    • C:\Windows\20221124\Sxs8C8W2Nne8ruRV\script\script.exe
      Filesize

      14KB

      MD5

      3dcd78c7a89db1d3203982b46802c9c0

      SHA1

      2795ad8b0083111f8a28534a12cb9cdb5a689a53

      SHA256

      79999072a577af5028f1b6bca397a0320850495b4d0f203704e4be4ba3554f36

      SHA512

      47dbec94a55bdc33097827f302850e6653cc86794c5e942697f8ccd0ee03b20209242712b4b05e6fccdf4ac8359540e35af519bfdff44766ea4483c7b0bd98af

    • C:\Windows\20221124\Sxs8C8W2Nne8ruRV\script\script.exe.bat
      Filesize

      210B

      MD5

      f408afa6dabb2984f4893391462f73a8

      SHA1

      2402eda2371b63f643fb2c83c732edad37a04908

      SHA256

      5598b8f652933d0b102343683f21bb300335c0b5f6d7745a777c2c123afca740

      SHA512

      23952da76545f0397d6cb08916409753fa97ecb711f47b3d27e15a11e05843e00748e45a8a72e7129d689617670d5d913cdcaab027a82cfebed676a7faa9b607

    • C:\Windows\20221124\yJbYYlr2CCbq558m\smss.exe
      Filesize

      16.1MB

      MD5

      c717db89be7db0767e9b3273c5640bdb

      SHA1

      1719d98b698f084a72a1ca932b929c94e6173adc

      SHA256

      fda08d0933ee49dff62d2957f9be2c1bb9b2b66bcdff14ff9043a1f9cd292274

      SHA512

      16b2509e125fc3a895badc715d29d1bba35bb0a4686b4a0e783682d78ed626c1fdfe114d9997d2b849b9d651b5a57dd4c401f821a28cf604566e4b2c52a21ba1

    • C:\Windows\20221124\yJbYYlr2CCbq558m\smss.exe
      Filesize

      16.1MB

      MD5

      c717db89be7db0767e9b3273c5640bdb

      SHA1

      1719d98b698f084a72a1ca932b929c94e6173adc

      SHA256

      fda08d0933ee49dff62d2957f9be2c1bb9b2b66bcdff14ff9043a1f9cd292274

      SHA512

      16b2509e125fc3a895badc715d29d1bba35bb0a4686b4a0e783682d78ed626c1fdfe114d9997d2b849b9d651b5a57dd4c401f821a28cf604566e4b2c52a21ba1

    • C:\Windows\20221124\yJbYYlr2CCbq558m\smss.exe.bat
      Filesize

      183B

      MD5

      1ea94ef9fc851cc62b3ddc7a54b083bc

      SHA1

      69b1f9e28e0e7748e1315ce93e38597724b7829d

      SHA256

      ffc357166997642a2d927e5167b21e3b714aaa6363e574866589e696e645e203

      SHA512

      3bbd6507f0a442a952fa0a8b0498545c2589b398790bbc34b4397a726f6208b3ffb406ed89f1a4b2cc39dc16839fe049e1028041f309cb1815ed40ad11c4d8a1

    • C:\Windows\userid.txt
      Filesize

      4B

      MD5

      5e76bef6e019b2541ff53db39f407a98

      SHA1

      3cd969896e49a6d3326acf33f0c2d8cc38b0d06a

      SHA256

      fddc599a3afe6c68b8098f7ef3db02335f7e398e3c0bd34b663f04f424886aeb

      SHA512

      5598677e4a2224825bb36dfdccc9be7ccc3f01b8ab84bc3b6c8f23f23d5f9b4fdc5aa17ec2c0640ac35d6cbdb60971c0dd9a8ddac560b41047cca26aa55baf31

    • C:\Windows\userid.txt
      Filesize

      4B

      MD5

      5e76bef6e019b2541ff53db39f407a98

      SHA1

      3cd969896e49a6d3326acf33f0c2d8cc38b0d06a

      SHA256

      fddc599a3afe6c68b8098f7ef3db02335f7e398e3c0bd34b663f04f424886aeb

      SHA512

      5598677e4a2224825bb36dfdccc9be7ccc3f01b8ab84bc3b6c8f23f23d5f9b4fdc5aa17ec2c0640ac35d6cbdb60971c0dd9a8ddac560b41047cca26aa55baf31

    • \Users\Admin\AppData\Local\Temp\d28r8SLQwI8a88x.exe
      Filesize

      125KB

      MD5

      ff6177534593a05bf753480352e30067

      SHA1

      69e9c9b8a94390b7d7639dfb21022247002ad285

      SHA256

      9b1810688f64818a3b1e6e9d0c292cc25f0e13ddd8b5a29d7f895316c0298d84

      SHA512

      9e6b2e618adfbf2e1d678c6d0c7d560517a3004e598da6623a3d56445ded1a6fe97524fbeccc8c5ca954b0f3b5e57530424423a0640fbe4257f405d634ab594b

    • \Users\Admin\AppData\Local\Temp\d28r8SLQwI8a88x.exe
      Filesize

      125KB

      MD5

      ff6177534593a05bf753480352e30067

      SHA1

      69e9c9b8a94390b7d7639dfb21022247002ad285

      SHA256

      9b1810688f64818a3b1e6e9d0c292cc25f0e13ddd8b5a29d7f895316c0298d84

      SHA512

      9e6b2e618adfbf2e1d678c6d0c7d560517a3004e598da6623a3d56445ded1a6fe97524fbeccc8c5ca954b0f3b5e57530424423a0640fbe4257f405d634ab594b

    • \Windows\20221124\H5NMDty8QkW88bPG\DownFiles.exe
      Filesize

      44KB

      MD5

      efbbd019efdd4af36da57cdae9553db2

      SHA1

      135afd51b152d44ee2f2c32a9d6fba1ae9a3d547

      SHA256

      11ec2a51ff5bf8b7e9c5a66a73fc10370c005fd4094b6522a2a0042f8683a2e8

      SHA512

      ff970d6780562820f98e083ac0e9af64582a76c4fe31392316cf9f925a70e122e80b24417187e83149d9c39391a017d09eb4603f81db49e809b31463557e6414

    • \Windows\20221124\H5NMDty8QkW88bPG\DownFiles.exe
      Filesize

      44KB

      MD5

      efbbd019efdd4af36da57cdae9553db2

      SHA1

      135afd51b152d44ee2f2c32a9d6fba1ae9a3d547

      SHA256

      11ec2a51ff5bf8b7e9c5a66a73fc10370c005fd4094b6522a2a0042f8683a2e8

      SHA512

      ff970d6780562820f98e083ac0e9af64582a76c4fe31392316cf9f925a70e122e80b24417187e83149d9c39391a017d09eb4603f81db49e809b31463557e6414

    • \Windows\20221124\Sxs8C8W2Nne8ruRV\script\script.exe
      Filesize

      14KB

      MD5

      3dcd78c7a89db1d3203982b46802c9c0

      SHA1

      2795ad8b0083111f8a28534a12cb9cdb5a689a53

      SHA256

      79999072a577af5028f1b6bca397a0320850495b4d0f203704e4be4ba3554f36

      SHA512

      47dbec94a55bdc33097827f302850e6653cc86794c5e942697f8ccd0ee03b20209242712b4b05e6fccdf4ac8359540e35af519bfdff44766ea4483c7b0bd98af

    • \Windows\20221124\Sxs8C8W2Nne8ruRV\script\script.exe
      Filesize

      14KB

      MD5

      3dcd78c7a89db1d3203982b46802c9c0

      SHA1

      2795ad8b0083111f8a28534a12cb9cdb5a689a53

      SHA256

      79999072a577af5028f1b6bca397a0320850495b4d0f203704e4be4ba3554f36

      SHA512

      47dbec94a55bdc33097827f302850e6653cc86794c5e942697f8ccd0ee03b20209242712b4b05e6fccdf4ac8359540e35af519bfdff44766ea4483c7b0bd98af

    • \Windows\20221124\yJbYYlr2CCbq558m\smss.exe
      Filesize

      16.1MB

      MD5

      c717db89be7db0767e9b3273c5640bdb

      SHA1

      1719d98b698f084a72a1ca932b929c94e6173adc

      SHA256

      fda08d0933ee49dff62d2957f9be2c1bb9b2b66bcdff14ff9043a1f9cd292274

      SHA512

      16b2509e125fc3a895badc715d29d1bba35bb0a4686b4a0e783682d78ed626c1fdfe114d9997d2b849b9d651b5a57dd4c401f821a28cf604566e4b2c52a21ba1

    • \Windows\20221124\yJbYYlr2CCbq558m\smss.exe
      Filesize

      16.1MB

      MD5

      c717db89be7db0767e9b3273c5640bdb

      SHA1

      1719d98b698f084a72a1ca932b929c94e6173adc

      SHA256

      fda08d0933ee49dff62d2957f9be2c1bb9b2b66bcdff14ff9043a1f9cd292274

      SHA512

      16b2509e125fc3a895badc715d29d1bba35bb0a4686b4a0e783682d78ed626c1fdfe114d9997d2b849b9d651b5a57dd4c401f821a28cf604566e4b2c52a21ba1

    • memory/520-65-0x0000000000000000-mapping.dmp
    • memory/588-62-0x0000000000000000-mapping.dmp
    • memory/692-79-0x0000000000000000-mapping.dmp
    • memory/920-95-0x0000000000000000-mapping.dmp
    • memory/1112-56-0x0000000000000000-mapping.dmp
    • memory/1192-92-0x0000000000000000-mapping.dmp
    • memory/1272-70-0x0000000000000000-mapping.dmp
    • memory/1580-74-0x0000000000000000-mapping.dmp
    • memory/1684-86-0x0000000000000000-mapping.dmp
    • memory/1684-90-0x0000000002C30000-0x00000000036EA000-memory.dmp
      Filesize

      10.7MB

    • memory/1912-81-0x0000000000000000-mapping.dmp
    • memory/1992-55-0x0000000000000000-mapping.dmp
    • memory/2032-54-0x0000000075C21000-0x0000000075C23000-memory.dmp
      Filesize

      8KB