Analysis

  • max time kernel
    158s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 08:56

General

  • Target

    e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exe

  • Size

    2.6MB

  • MD5

    ebc9ba7ef7e078bc403b8ef0b8a6e1ee

  • SHA1

    5ffe76534fd03b32984efff1db2f8715e58703dc

  • SHA256

    e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802

  • SHA512

    332cfe257c66f6a0e99f84c3cafafa19cb4e2384dbefe37addb215019a4f9c11291c366476bee778df9466ea52304ca9aac9ae9667962ac6d0ced5c0caa2a148

  • SSDEEP

    49152:CKNmFAzae9eKXRxRcdKc8EIAQEbQCyexJs2yYPPBCE5uUBvi3ZHJxsaOMRJ:WFWUKnudKII1Eb7dhHRQLZpuK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exe
    "C:\Users\Admin\AppData\Local\Temp\e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exe PhxQsg.ppt
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2508

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HLink.dll
    Filesize

    80KB

    MD5

    92db419fd98b197e73b57997d83fea52

    SHA1

    195246cff5e7f8fc313a7a47948a8f57b8b3ce08

    SHA256

    e138dc8267b86411afc81cd9a6148334f55b027173765d1b07abf4a97ab5da97

    SHA512

    a08a25c36fa0d3ae1ef323f36842f87259bcb9f8572f44caedd69c02e76b611c94e08baa6f38b6ed320ae9528f8ac56aab87401fdb709f87cb6d3629f7873a0b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSO97v.DLL
    Filesize

    1.6MB

    MD5

    5a5abb409208ec32459aa1bc6f70b357

    SHA1

    36edf66cbf1020558e613d6cf91f790943e49ce5

    SHA256

    f3159691bdf53f63b4e588c04333599e9086a0a7eb59bddac4d7331f5aff274f

    SHA512

    801ec5d74bf0436dc54c9e22c5e941f5ea481c41fe618f06b4e139c36f6dcd9b1417be63353ee661c285312e5861d2c534ddecbd5ca7af851c8d706f8bf333ac

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSV7ENU.DLL
    Filesize

    223KB

    MD5

    0a97e3993a4d202275aaaf990fd4492e

    SHA1

    9ce5f40bc2271d6ab357031fe5c443e3e776a9ec

    SHA256

    bdc49896d6a38f4d6ae3ca3b42233ba4bd4842e35a4459386e9c7d12fa15b640

    SHA512

    64c778bdb7e30725a1e32a69d24643223bfe0913be6c0339106bb3b1d99eaa4549386ab2bf7d553a0ad1b72f1bb3250a43387088336e768ac0f2e13b8abf4e07

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PPIntlv.DLL
    Filesize

    154KB

    MD5

    5c5faeebdcc03ab60a8f968d9fd56548

    SHA1

    f0633c6d4238cb59c7cdfa4ea2aeca0019901e67

    SHA256

    366ed2fa94f707f7cf0800771d8daae8574ce5d1bab2b4bebd1e92d84a2d6fe8

    SHA512

    71c70d82c673188063f43b6ba50c21fc048e397e62df87f489dd90e96c788168b55de56f952790f2f0a386bb5c120c94980131c5a527939564de8efbb07cf37f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PhxQsg.ppt
    Filesize

    214KB

    MD5

    7738aeb45841e76138549fef14d61dae

    SHA1

    b3feea0075b139c86f6954bdb6a1703d82dcb7cf

    SHA256

    2e63d5e531ba43aea0aac8d60c6ab88cb05608a79f7286a86a6383715b83d7da

    SHA512

    a0baa487839ebefa474b8829eba66e7fd2ac0511278149a3c773d39130bcc8dd2344b0b61ef664efbae25e6b5b003a9866c620218ba40c68855f0dda304a360f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hlink.dll
    Filesize

    80KB

    MD5

    92db419fd98b197e73b57997d83fea52

    SHA1

    195246cff5e7f8fc313a7a47948a8f57b8b3ce08

    SHA256

    e138dc8267b86411afc81cd9a6148334f55b027173765d1b07abf4a97ab5da97

    SHA512

    a08a25c36fa0d3ae1ef323f36842f87259bcb9f8572f44caedd69c02e76b611c94e08baa6f38b6ed320ae9528f8ac56aab87401fdb709f87cb6d3629f7873a0b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hlink.dll
    Filesize

    80KB

    MD5

    92db419fd98b197e73b57997d83fea52

    SHA1

    195246cff5e7f8fc313a7a47948a8f57b8b3ce08

    SHA256

    e138dc8267b86411afc81cd9a6148334f55b027173765d1b07abf4a97ab5da97

    SHA512

    a08a25c36fa0d3ae1ef323f36842f87259bcb9f8572f44caedd69c02e76b611c94e08baa6f38b6ed320ae9528f8ac56aab87401fdb709f87cb6d3629f7873a0b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mso97v.dll
    Filesize

    1.6MB

    MD5

    5a5abb409208ec32459aa1bc6f70b357

    SHA1

    36edf66cbf1020558e613d6cf91f790943e49ce5

    SHA256

    f3159691bdf53f63b4e588c04333599e9086a0a7eb59bddac4d7331f5aff274f

    SHA512

    801ec5d74bf0436dc54c9e22c5e941f5ea481c41fe618f06b4e139c36f6dcd9b1417be63353ee661c285312e5861d2c534ddecbd5ca7af851c8d706f8bf333ac

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msppt8vr.olb
    Filesize

    5KB

    MD5

    2c78fccd977621990cf608f0f5a50740

    SHA1

    53bbaa08ec35b092f7a08a53b7e8b2da744d7052

    SHA256

    b1c6335b894d68979a48b7460c2d476d7c32a2fa67d24c89bb26c9b621a6a5a9

    SHA512

    53da3decc95513b11707393028df4bad28e48d29526c654aa0ced10549a38d4f0572246dd8ea09dfcf6f4688c3b7c4c41c54586916ee3355c7e2887e93dde2fb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppintlv.dll
    Filesize

    154KB

    MD5

    5c5faeebdcc03ab60a8f968d9fd56548

    SHA1

    f0633c6d4238cb59c7cdfa4ea2aeca0019901e67

    SHA256

    366ed2fa94f707f7cf0800771d8daae8574ce5d1bab2b4bebd1e92d84a2d6fe8

    SHA512

    71c70d82c673188063f43b6ba50c21fc048e397e62df87f489dd90e96c788168b55de56f952790f2f0a386bb5c120c94980131c5a527939564de8efbb07cf37f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exe
    Filesize

    1.4MB

    MD5

    e00540bd2e24a5076116f84d79e9dfda

    SHA1

    b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9

    SHA256

    d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6

    SHA512

    2f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exe
    Filesize

    1.4MB

    MD5

    e00540bd2e24a5076116f84d79e9dfda

    SHA1

    b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9

    SHA256

    d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6

    SHA512

    2f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\urlmon.dll
    Filesize

    438KB

    MD5

    e14bf01b9dc91cc8e370717198deb5ad

    SHA1

    fedfa71917b7ae48c19cb683e50dfe6f804a89fa

    SHA256

    c7b2378febf713e4c8e52d8b754f879f43b452693943db4ad0181030fe02cb81

    SHA512

    759ebf8524120ea8736617eedb72031f5779ee1ce194ac9eba277be5ff21d44271d99d245be41d3f30ab18917b53ea682c4c6f2520203b25ae20f018b8238876

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\urlmon.dll
    Filesize

    438KB

    MD5

    e14bf01b9dc91cc8e370717198deb5ad

    SHA1

    fedfa71917b7ae48c19cb683e50dfe6f804a89fa

    SHA256

    c7b2378febf713e4c8e52d8b754f879f43b452693943db4ad0181030fe02cb81

    SHA512

    759ebf8524120ea8736617eedb72031f5779ee1ce194ac9eba277be5ff21d44271d99d245be41d3f30ab18917b53ea682c4c6f2520203b25ae20f018b8238876

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\urlmon.dll
    Filesize

    438KB

    MD5

    e14bf01b9dc91cc8e370717198deb5ad

    SHA1

    fedfa71917b7ae48c19cb683e50dfe6f804a89fa

    SHA256

    c7b2378febf713e4c8e52d8b754f879f43b452693943db4ad0181030fe02cb81

    SHA512

    759ebf8524120ea8736617eedb72031f5779ee1ce194ac9eba277be5ff21d44271d99d245be41d3f30ab18917b53ea682c4c6f2520203b25ae20f018b8238876

  • memory/2508-132-0x0000000000000000-mapping.dmp
  • memory/2508-145-0x0000000005250000-0x0000000005264000-memory.dmp
    Filesize

    80KB

  • memory/2508-146-0x0000000005251000-0x0000000005260000-memory.dmp
    Filesize

    60KB

  • memory/2508-150-0x0000000005270000-0x00000000052E8000-memory.dmp
    Filesize

    480KB

  • memory/2508-151-0x0000000005271000-0x00000000052C9000-memory.dmp
    Filesize

    352KB