Analysis

  • max time kernel
    169s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 22:37

General

  • Target

    f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3.exe

  • Size

    192KB

  • MD5

    f8b629eee798245f18f2b7415642993a

  • SHA1

    3853e76f713d1274f6e897b4957a74bd9fcfd98e

  • SHA256

    f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3

  • SHA512

    eba6df3594fa71d806d0910fc740371fb0223cd200344315e2cc0a109db01abfc223a3053a57c9651ff0eadb3fbac66f39de6a5a9e1d231a0f2fd342816549fe

  • SSDEEP

    3072:kAoU1Bieu+xxf0pTraRV5uH/QJillUd2KltjGSVVfKmw9y:1in+oTCG/z62+9+y

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3.exe
    "C:\Users\Admin\AppData\Local\Temp\f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3.exe
      C:\Users\Admin\AppData\Local\Temp\f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Users\Admin\AppData\Roaming\Microsoft\winlog.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\winlog.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1212
        • C:\Users\Admin\AppData\Roaming\Microsoft\winlog.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\winlog.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Enumerates connected drives
          PID:1136

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\winlog.exe
    Filesize

    192KB

    MD5

    f8b629eee798245f18f2b7415642993a

    SHA1

    3853e76f713d1274f6e897b4957a74bd9fcfd98e

    SHA256

    f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3

    SHA512

    eba6df3594fa71d806d0910fc740371fb0223cd200344315e2cc0a109db01abfc223a3053a57c9651ff0eadb3fbac66f39de6a5a9e1d231a0f2fd342816549fe

  • C:\Users\Admin\AppData\Roaming\Microsoft\winlog.exe
    Filesize

    192KB

    MD5

    f8b629eee798245f18f2b7415642993a

    SHA1

    3853e76f713d1274f6e897b4957a74bd9fcfd98e

    SHA256

    f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3

    SHA512

    eba6df3594fa71d806d0910fc740371fb0223cd200344315e2cc0a109db01abfc223a3053a57c9651ff0eadb3fbac66f39de6a5a9e1d231a0f2fd342816549fe

  • C:\Users\Admin\AppData\Roaming\Microsoft\winlog.exe
    Filesize

    192KB

    MD5

    f8b629eee798245f18f2b7415642993a

    SHA1

    3853e76f713d1274f6e897b4957a74bd9fcfd98e

    SHA256

    f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3

    SHA512

    eba6df3594fa71d806d0910fc740371fb0223cd200344315e2cc0a109db01abfc223a3053a57c9651ff0eadb3fbac66f39de6a5a9e1d231a0f2fd342816549fe

  • \Users\Admin\AppData\Roaming\Microsoft\winlog.exe
    Filesize

    192KB

    MD5

    f8b629eee798245f18f2b7415642993a

    SHA1

    3853e76f713d1274f6e897b4957a74bd9fcfd98e

    SHA256

    f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3

    SHA512

    eba6df3594fa71d806d0910fc740371fb0223cd200344315e2cc0a109db01abfc223a3053a57c9651ff0eadb3fbac66f39de6a5a9e1d231a0f2fd342816549fe

  • \Users\Admin\AppData\Roaming\Microsoft\winlog.exe
    Filesize

    192KB

    MD5

    f8b629eee798245f18f2b7415642993a

    SHA1

    3853e76f713d1274f6e897b4957a74bd9fcfd98e

    SHA256

    f242374e518229643caa67f314f06c47ed5d1ba6287a2168ac6f84b2578fdbb3

    SHA512

    eba6df3594fa71d806d0910fc740371fb0223cd200344315e2cc0a109db01abfc223a3053a57c9651ff0eadb3fbac66f39de6a5a9e1d231a0f2fd342816549fe

  • memory/1136-66-0x00000000114AE184-mapping.dmp
  • memory/1136-70-0x0000000011490000-0x00000000114BA000-memory.dmp
    Filesize

    168KB

  • memory/1136-71-0x0000000011490000-0x00000000114BA000-memory.dmp
    Filesize

    168KB

  • memory/1136-72-0x0000000011490000-0x00000000114BA000-memory.dmp
    Filesize

    168KB

  • memory/1212-62-0x0000000000000000-mapping.dmp
  • memory/1696-59-0x0000000011490000-0x00000000114BA000-memory.dmp
    Filesize

    168KB

  • memory/1696-58-0x0000000011490000-0x00000000114BA000-memory.dmp
    Filesize

    168KB

  • memory/1696-54-0x0000000011490000-0x00000000114BA000-memory.dmp
    Filesize

    168KB

  • memory/1696-57-0x0000000076171000-0x0000000076173000-memory.dmp
    Filesize

    8KB

  • memory/1696-56-0x0000000011490000-0x00000000114BA000-memory.dmp
    Filesize

    168KB

  • memory/1696-55-0x00000000114AE184-mapping.dmp