Analysis

  • max time kernel
    203s
  • max time network
    198s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 19:44

General

  • Target

    c1cca7728dabf7ce7ecdfaecc8c54412207aff39490cd557b1db568c97437100.exe

  • Size

    346KB

  • MD5

    8e5b11b4459592014296f9ab307004a6

  • SHA1

    b0cd326c8389db2adeadd541cb21e1fbfb346c80

  • SHA256

    c1cca7728dabf7ce7ecdfaecc8c54412207aff39490cd557b1db568c97437100

  • SHA512

    a9cac4fbd5eb23fa15564bcfac2734171b4650d7bf8e9218e917e2f0168667a88f0538c21f75ce6057355ea825bdddafee62afc063503e18bf6f824dd50d5b16

  • SSDEEP

    6144:jPL9R55VPkcn0QtPoNHMTMnUDHohJMJ/rTK/Va13YTJt2:rpRZPA06MTMUqddC2a

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1124
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1216
        • C:\Users\Admin\AppData\Local\Temp\c1cca7728dabf7ce7ecdfaecc8c54412207aff39490cd557b1db568c97437100.exe
          "C:\Users\Admin\AppData\Local\Temp\c1cca7728dabf7ce7ecdfaecc8c54412207aff39490cd557b1db568c97437100.exe"
          2⤵
          • Drops startup file
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:952
          • C:\Users\Admin\AppData\Roaming\wrdr\yysl.exe
            "C:\Users\Admin\AppData\Roaming\wrdr\yysl.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:2032
            • C:\Users\Admin\AppData\Roaming\wrdr\yysl.exe
              "C:\Users\Admin\AppData\Roaming\wrdr\yysl.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1012
              • C:\Users\Admin\AppData\Local\Temp\FB_4210.tmp.exe
                "C:\Users\Admin\AppData\Local\Temp\FB_4210.tmp.exe"
                5⤵
                • Executes dropped EXE
                PID:1484
              • C:\Users\Admin\AppData\Local\Temp\FB_654A.tmp.exe
                "C:\Users\Admin\AppData\Local\Temp\FB_654A.tmp.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1148
                • C:\Users\Admin\AppData\Roaming\Zuaga\gowi.exe
                  "C:\Users\Admin\AppData\Roaming\Zuaga\gowi.exe"
                  6⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:760
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp86dc9a7d.bat"
                  6⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2028
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1180
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "603643580181230018331382670816828274531957060527897768329-1946219206-433460032"
          1⤵
            PID:668
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1640
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:2020
              • C:\Program Files\Windows Mail\WinMail.exe
                "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1576

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              Registry Run Keys / Startup Folder

              1
              T1060

              Defense Evasion

              Modify Registry

              2
              T1112

              Discovery

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\FB_4210.tmp.exe
                Filesize

                3KB

                MD5

                74bafb3e707c7b0c63938ac200f99c7f

                SHA1

                10c5506337845ed9bf25c73d2506f9c15ab8e608

                SHA256

                129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689

                SHA512

                5b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781

              • C:\Users\Admin\AppData\Local\Temp\FB_654A.tmp.exe
                Filesize

                138KB

                MD5

                c20a02e741f60444d5958b82ea1f9733

                SHA1

                bbb9aa78eeb9ef412c1bd78ce44d328118b5706e

                SHA256

                c89c7939f95bcf69c4d0be1eab980e232f7bce1d3ab4178c311bb25506e35084

                SHA512

                48ea63d2e4b8f80a30ae4a52c6e3591bb37f5a6b2b0be8f1762d501d1c5a5ec7bc4bf9ac2944e758a6b97d69c8eadb5950c4de2070a644430fa628ccd4d96dbc

              • C:\Users\Admin\AppData\Local\Temp\FB_654A.tmp.exe
                Filesize

                138KB

                MD5

                c20a02e741f60444d5958b82ea1f9733

                SHA1

                bbb9aa78eeb9ef412c1bd78ce44d328118b5706e

                SHA256

                c89c7939f95bcf69c4d0be1eab980e232f7bce1d3ab4178c311bb25506e35084

                SHA512

                48ea63d2e4b8f80a30ae4a52c6e3591bb37f5a6b2b0be8f1762d501d1c5a5ec7bc4bf9ac2944e758a6b97d69c8eadb5950c4de2070a644430fa628ccd4d96dbc

              • C:\Users\Admin\AppData\Roaming\Ucmyom\olne.omy
                Filesize

                345B

                MD5

                ae690e3b434efcf6616ed9dd4072247f

                SHA1

                49f622a42323e97a44415619eb4a723ec6e02d41

                SHA256

                8a64599f4f4b8d15bd767c40ebf5ad369ac0c09b98608493677802c9ab4efcb7

                SHA512

                8280ca3092aadea10c2da1fb549a2a9fe6a5b9abff78125514faf8cdb7781b7e6670621b14a3927bae8de6905229bae195067feb0d973455e399b6fa9e867eec

              • C:\Users\Admin\AppData\Roaming\Zuaga\gowi.exe
                Filesize

                138KB

                MD5

                f6e0699583c92f70399db89461dc5583

                SHA1

                2a3214320a66b47573e50dfa8d792081c6cfddb5

                SHA256

                6cefbba2dcafa50398d271f5d462a4200486f31b4c2b1786e9f80b128714a23c

                SHA512

                a9dc7bc9165615bb6d1e93336e55650c9701262062341e1cc118822c74f98826780c3730162e57ca8bd86e7b410451140a5f3e1bec3af2abc1320042939d8fb3

              • C:\Users\Admin\AppData\Roaming\Zuaga\gowi.exe
                Filesize

                138KB

                MD5

                f6e0699583c92f70399db89461dc5583

                SHA1

                2a3214320a66b47573e50dfa8d792081c6cfddb5

                SHA256

                6cefbba2dcafa50398d271f5d462a4200486f31b4c2b1786e9f80b128714a23c

                SHA512

                a9dc7bc9165615bb6d1e93336e55650c9701262062341e1cc118822c74f98826780c3730162e57ca8bd86e7b410451140a5f3e1bec3af2abc1320042939d8fb3

              • C:\Users\Admin\AppData\Roaming\wrdr\yysl.exe
                Filesize

                346KB

                MD5

                8e5b11b4459592014296f9ab307004a6

                SHA1

                b0cd326c8389db2adeadd541cb21e1fbfb346c80

                SHA256

                c1cca7728dabf7ce7ecdfaecc8c54412207aff39490cd557b1db568c97437100

                SHA512

                a9cac4fbd5eb23fa15564bcfac2734171b4650d7bf8e9218e917e2f0168667a88f0538c21f75ce6057355ea825bdddafee62afc063503e18bf6f824dd50d5b16

              • C:\Users\Admin\AppData\Roaming\wrdr\yysl.exe
                Filesize

                346KB

                MD5

                8e5b11b4459592014296f9ab307004a6

                SHA1

                b0cd326c8389db2adeadd541cb21e1fbfb346c80

                SHA256

                c1cca7728dabf7ce7ecdfaecc8c54412207aff39490cd557b1db568c97437100

                SHA512

                a9cac4fbd5eb23fa15564bcfac2734171b4650d7bf8e9218e917e2f0168667a88f0538c21f75ce6057355ea825bdddafee62afc063503e18bf6f824dd50d5b16

              • \Users\Admin\AppData\Local\Temp\FB_4210.tmp.exe
                Filesize

                3KB

                MD5

                74bafb3e707c7b0c63938ac200f99c7f

                SHA1

                10c5506337845ed9bf25c73d2506f9c15ab8e608

                SHA256

                129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689

                SHA512

                5b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781

              • \Users\Admin\AppData\Local\Temp\FB_4210.tmp.exe
                Filesize

                3KB

                MD5

                74bafb3e707c7b0c63938ac200f99c7f

                SHA1

                10c5506337845ed9bf25c73d2506f9c15ab8e608

                SHA256

                129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689

                SHA512

                5b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781

              • \Users\Admin\AppData\Local\Temp\FB_654A.tmp.exe
                Filesize

                138KB

                MD5

                c20a02e741f60444d5958b82ea1f9733

                SHA1

                bbb9aa78eeb9ef412c1bd78ce44d328118b5706e

                SHA256

                c89c7939f95bcf69c4d0be1eab980e232f7bce1d3ab4178c311bb25506e35084

                SHA512

                48ea63d2e4b8f80a30ae4a52c6e3591bb37f5a6b2b0be8f1762d501d1c5a5ec7bc4bf9ac2944e758a6b97d69c8eadb5950c4de2070a644430fa628ccd4d96dbc

              • \Users\Admin\AppData\Local\Temp\FB_654A.tmp.exe
                Filesize

                138KB

                MD5

                c20a02e741f60444d5958b82ea1f9733

                SHA1

                bbb9aa78eeb9ef412c1bd78ce44d328118b5706e

                SHA256

                c89c7939f95bcf69c4d0be1eab980e232f7bce1d3ab4178c311bb25506e35084

                SHA512

                48ea63d2e4b8f80a30ae4a52c6e3591bb37f5a6b2b0be8f1762d501d1c5a5ec7bc4bf9ac2944e758a6b97d69c8eadb5950c4de2070a644430fa628ccd4d96dbc

              • \Users\Admin\AppData\Roaming\Zuaga\gowi.exe
                Filesize

                138KB

                MD5

                f6e0699583c92f70399db89461dc5583

                SHA1

                2a3214320a66b47573e50dfa8d792081c6cfddb5

                SHA256

                6cefbba2dcafa50398d271f5d462a4200486f31b4c2b1786e9f80b128714a23c

                SHA512

                a9dc7bc9165615bb6d1e93336e55650c9701262062341e1cc118822c74f98826780c3730162e57ca8bd86e7b410451140a5f3e1bec3af2abc1320042939d8fb3

              • \Users\Admin\AppData\Roaming\Zuaga\gowi.exe
                Filesize

                138KB

                MD5

                f6e0699583c92f70399db89461dc5583

                SHA1

                2a3214320a66b47573e50dfa8d792081c6cfddb5

                SHA256

                6cefbba2dcafa50398d271f5d462a4200486f31b4c2b1786e9f80b128714a23c

                SHA512

                a9dc7bc9165615bb6d1e93336e55650c9701262062341e1cc118822c74f98826780c3730162e57ca8bd86e7b410451140a5f3e1bec3af2abc1320042939d8fb3

              • \Users\Admin\AppData\Roaming\wrdr\yysl.exe
                Filesize

                346KB

                MD5

                8e5b11b4459592014296f9ab307004a6

                SHA1

                b0cd326c8389db2adeadd541cb21e1fbfb346c80

                SHA256

                c1cca7728dabf7ce7ecdfaecc8c54412207aff39490cd557b1db568c97437100

                SHA512

                a9cac4fbd5eb23fa15564bcfac2734171b4650d7bf8e9218e917e2f0168667a88f0538c21f75ce6057355ea825bdddafee62afc063503e18bf6f824dd50d5b16

              • memory/668-117-0x0000000001A40000-0x0000000001A67000-memory.dmp
                Filesize

                156KB

              • memory/668-121-0x0000000001A40000-0x0000000001A67000-memory.dmp
                Filesize

                156KB

              • memory/668-119-0x0000000001A40000-0x0000000001A67000-memory.dmp
                Filesize

                156KB

              • memory/668-118-0x0000000001A40000-0x0000000001A67000-memory.dmp
                Filesize

                156KB

              • memory/760-75-0x0000000000000000-mapping.dmp
              • memory/952-54-0x0000000075AE1000-0x0000000075AE3000-memory.dmp
                Filesize

                8KB

              • memory/1012-59-0x0000000000401190-mapping.dmp
              • memory/1012-62-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/1124-79-0x0000000001C10000-0x0000000001C37000-memory.dmp
                Filesize

                156KB

              • memory/1124-82-0x0000000001C10000-0x0000000001C37000-memory.dmp
                Filesize

                156KB

              • memory/1124-84-0x0000000001C10000-0x0000000001C37000-memory.dmp
                Filesize

                156KB

              • memory/1124-83-0x0000000001C10000-0x0000000001C37000-memory.dmp
                Filesize

                156KB

              • memory/1124-81-0x0000000001C10000-0x0000000001C37000-memory.dmp
                Filesize

                156KB

              • memory/1148-105-0x0000000000290000-0x00000000002B7000-memory.dmp
                Filesize

                156KB

              • memory/1148-69-0x0000000000000000-mapping.dmp
              • memory/1148-101-0x0000000000290000-0x00000000002B7000-memory.dmp
                Filesize

                156KB

              • memory/1148-99-0x0000000000290000-0x00000000002B7000-memory.dmp
                Filesize

                156KB

              • memory/1148-100-0x0000000000290000-0x00000000002B7000-memory.dmp
                Filesize

                156KB

              • memory/1148-102-0x0000000000290000-0x00000000002B7000-memory.dmp
                Filesize

                156KB

              • memory/1148-103-0x0000000000290000-0x00000000002B7000-memory.dmp
                Filesize

                156KB

              • memory/1180-88-0x0000000001AF0000-0x0000000001B17000-memory.dmp
                Filesize

                156KB

              • memory/1180-89-0x0000000001AF0000-0x0000000001B17000-memory.dmp
                Filesize

                156KB

              • memory/1180-90-0x0000000001AF0000-0x0000000001B17000-memory.dmp
                Filesize

                156KB

              • memory/1180-87-0x0000000001AF0000-0x0000000001B17000-memory.dmp
                Filesize

                156KB

              • memory/1216-93-0x0000000002250000-0x0000000002277000-memory.dmp
                Filesize

                156KB

              • memory/1216-96-0x0000000002250000-0x0000000002277000-memory.dmp
                Filesize

                156KB

              • memory/1216-95-0x0000000002250000-0x0000000002277000-memory.dmp
                Filesize

                156KB

              • memory/1216-94-0x0000000002250000-0x0000000002277000-memory.dmp
                Filesize

                156KB

              • memory/1484-65-0x0000000000000000-mapping.dmp
              • memory/1576-142-0x0000000001FC0000-0x0000000001FD0000-memory.dmp
                Filesize

                64KB

              • memory/1576-136-0x0000000001F60000-0x0000000001F70000-memory.dmp
                Filesize

                64KB

              • memory/1576-135-0x000007FEF57E1000-0x000007FEF57E3000-memory.dmp
                Filesize

                8KB

              • memory/1576-134-0x000007FEFBA61000-0x000007FEFBA63000-memory.dmp
                Filesize

                8KB

              • memory/1640-125-0x00000000004F0000-0x0000000000517000-memory.dmp
                Filesize

                156KB

              • memory/1640-124-0x00000000004F0000-0x0000000000517000-memory.dmp
                Filesize

                156KB

              • memory/1640-126-0x00000000004F0000-0x0000000000517000-memory.dmp
                Filesize

                156KB

              • memory/1640-127-0x00000000004F0000-0x0000000000517000-memory.dmp
                Filesize

                156KB

              • memory/2020-133-0x0000000002510000-0x0000000002537000-memory.dmp
                Filesize

                156KB

              • memory/2020-132-0x0000000002510000-0x0000000002537000-memory.dmp
                Filesize

                156KB

              • memory/2020-131-0x0000000002510000-0x0000000002537000-memory.dmp
                Filesize

                156KB

              • memory/2020-130-0x0000000002510000-0x0000000002537000-memory.dmp
                Filesize

                156KB

              • memory/2028-113-0x00000000000C2CBA-mapping.dmp
              • memory/2028-120-0x00000000000B0000-0x00000000000D7000-memory.dmp
                Filesize

                156KB

              • memory/2028-112-0x00000000000B0000-0x00000000000D7000-memory.dmp
                Filesize

                156KB

              • memory/2028-111-0x00000000000B0000-0x00000000000D7000-memory.dmp
                Filesize

                156KB

              • memory/2028-110-0x00000000000B0000-0x00000000000D7000-memory.dmp
                Filesize

                156KB

              • memory/2028-108-0x00000000000B0000-0x00000000000D7000-memory.dmp
                Filesize

                156KB

              • memory/2032-56-0x0000000000000000-mapping.dmp