Analysis

  • max time kernel
    152s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 07:48

General

  • Target

    6126a6b258c310c99c68f19b325042fbe462619b3b0ddf25498b04f172fbc261.exe

  • Size

    59KB

  • MD5

    d2dff3b78b10e57635b077a4493381e0

  • SHA1

    f7a40815fc6510532b28d6831ca71aeaf37bbd21

  • SHA256

    6126a6b258c310c99c68f19b325042fbe462619b3b0ddf25498b04f172fbc261

  • SHA512

    35b9ac3b5f047d3a07fb121af856222238f8e96c30797bc48d8c5a1aa242e136132410cce789ed468fe6fc199d104aace6d291b845f3a576bfb705bf1e5ac3bd

  • SSDEEP

    768:OvVuwN4RSiKxVFZ8hk6GPXYrCNU+NUU3wbTXtP/9U4WI0:2VuwN4NKxVFNAmNbLgnXtXxW5

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6126a6b258c310c99c68f19b325042fbe462619b3b0ddf25498b04f172fbc261.exe
    "C:\Users\Admin\AppData\Local\Temp\6126a6b258c310c99c68f19b325042fbe462619b3b0ddf25498b04f172fbc261.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Roaming\Chrome Update.exe
      "C:\Users\Admin\AppData\Roaming\Chrome Update.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:940
      • C:\Windows\system32\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Chrome Update.exe" "Chrome Update.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:1924

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Chrome Update.exe
    Filesize

    59KB

    MD5

    d2dff3b78b10e57635b077a4493381e0

    SHA1

    f7a40815fc6510532b28d6831ca71aeaf37bbd21

    SHA256

    6126a6b258c310c99c68f19b325042fbe462619b3b0ddf25498b04f172fbc261

    SHA512

    35b9ac3b5f047d3a07fb121af856222238f8e96c30797bc48d8c5a1aa242e136132410cce789ed468fe6fc199d104aace6d291b845f3a576bfb705bf1e5ac3bd

  • C:\Users\Admin\AppData\Roaming\Chrome Update.exe
    Filesize

    59KB

    MD5

    d2dff3b78b10e57635b077a4493381e0

    SHA1

    f7a40815fc6510532b28d6831ca71aeaf37bbd21

    SHA256

    6126a6b258c310c99c68f19b325042fbe462619b3b0ddf25498b04f172fbc261

    SHA512

    35b9ac3b5f047d3a07fb121af856222238f8e96c30797bc48d8c5a1aa242e136132410cce789ed468fe6fc199d104aace6d291b845f3a576bfb705bf1e5ac3bd

  • memory/940-60-0x000007FEF4710000-0x000007FEF5133000-memory.dmp
    Filesize

    10.1MB

  • memory/940-57-0x0000000000000000-mapping.dmp
  • memory/940-61-0x000007FEF3670000-0x000007FEF4706000-memory.dmp
    Filesize

    16.6MB

  • memory/940-62-0x0000000000A96000-0x0000000000AB5000-memory.dmp
    Filesize

    124KB

  • memory/940-65-0x0000000000A96000-0x0000000000AB5000-memory.dmp
    Filesize

    124KB

  • memory/1620-56-0x0000000000B96000-0x0000000000BB5000-memory.dmp
    Filesize

    124KB

  • memory/1620-55-0x000007FEF3670000-0x000007FEF4706000-memory.dmp
    Filesize

    16.6MB

  • memory/1620-54-0x000007FEF4710000-0x000007FEF5133000-memory.dmp
    Filesize

    10.1MB

  • memory/1620-63-0x0000000000B96000-0x0000000000BB5000-memory.dmp
    Filesize

    124KB

  • memory/1620-64-0x0000000000B96000-0x0000000000BB5000-memory.dmp
    Filesize

    124KB

  • memory/1924-66-0x0000000000000000-mapping.dmp
  • memory/1924-67-0x000007FEFC161000-0x000007FEFC163000-memory.dmp
    Filesize

    8KB