Analysis

  • max time kernel
    206s
  • max time network
    292s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 11:45

General

  • Target

    578fa9ea352f78b1443c817ae43ee968fb6d827b8fbb9dd30fab6e23c8c80744.exe

  • Size

    258KB

  • MD5

    8316cf2207ab369a8b48615324f4d794

  • SHA1

    e1ce12d761c055692847b5281f9c457f19847d67

  • SHA256

    578fa9ea352f78b1443c817ae43ee968fb6d827b8fbb9dd30fab6e23c8c80744

  • SHA512

    c0f3c27125d947469286c7df30859256054bedd02b0834e14a7dde801064235246a94dd805ca54cc538f0442c7e1b4009ee2fd12b5ad885b3f307ead9901bbfc

  • SSDEEP

    6144:N2c68qqv3gyy6wP2xnK7KlEV7DVKduhqb:N6877y7P2xnIK+lpGuh+

Malware Config

Signatures

  • CryptOne packer 12 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\578fa9ea352f78b1443c817ae43ee968fb6d827b8fbb9dd30fab6e23c8c80744.exe
    "C:\Users\Admin\AppData\Local\Temp\578fa9ea352f78b1443c817ae43ee968fb6d827b8fbb9dd30fab6e23c8c80744.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Users\Admin\AppData\Local\Temp\578fa9ea352f78b1443c817ae43ee968fb6d827b8fbb9dd30fab6e23c8c80744.exe
      "C:\Users\Admin\AppData\Local\Temp\578fa9ea352f78b1443c817ae43ee968fb6d827b8fbb9dd30fab6e23c8c80744.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Windows\SysWOW64\calc.exe
        "C:\Windows\SysWOW64\calc.exe"
        3⤵
          PID:436
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\SysWOW64\svchost.exe"
          3⤵
          • Adds Run key to start application
          • Enumerates connected drives
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1572
          • C:\Windows\SysWOW64\mspaint.exe
            "C:\Windows\SysWOW64\mspaint.exe"
            4⤵
            • Adds Run key to start application
            • Enumerates connected drives
            PID:1016
        • C:\Users\Admin\AppData\Local\Temp\578fa9ea352f78b1443c817ae43ee968fb6d827b8fbb9dd30fab6e23c8c80744.exe
          "C:\Users\Admin\AppData\Local\Temp\578fa9ea352f78b1443c817ae43ee968fb6d827b8fbb9dd30fab6e23c8c80744.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1856

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/436-117-0x00000000001C0000-0x000000000020E000-memory.dmp
      Filesize

      312KB

    • memory/436-109-0x00000000001C0000-0x000000000020E000-memory.dmp
      Filesize

      312KB

    • memory/436-341-0x00000000001F8000-0x00000000001FA000-memory.dmp
      Filesize

      8KB

    • memory/436-338-0x00000000001C0000-0x000000000020E000-memory.dmp
      Filesize

      312KB

    • memory/436-137-0x00000000001C0000-0x000000000020E000-memory.dmp
      Filesize

      312KB

    • memory/436-98-0x0000000000080000-0x0000000000082000-memory.dmp
      Filesize

      8KB

    • memory/436-128-0x00000000001C0000-0x000000000020E000-memory.dmp
      Filesize

      312KB

    • memory/436-73-0x0000000000000000-mapping.dmp
    • memory/436-123-0x00000000001C0000-0x000000000020E000-memory.dmp
      Filesize

      312KB

    • memory/436-112-0x00000000001C0000-0x000000000020E000-memory.dmp
      Filesize

      312KB

    • memory/436-70-0x0000000000080000-0x0000000000082000-memory.dmp
      Filesize

      8KB

    • memory/856-65-0x0000000000220000-0x0000000000234000-memory.dmp
      Filesize

      80KB

    • memory/1016-131-0x0000000000140000-0x000000000018E000-memory.dmp
      Filesize

      312KB

    • memory/1016-126-0x0000000000140000-0x000000000018E000-memory.dmp
      Filesize

      312KB

    • memory/1016-100-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/1016-80-0x0000000000000000-mapping.dmp
    • memory/1016-82-0x0000000000411000-0x0000000000413000-memory.dmp
      Filesize

      8KB

    • memory/1016-84-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/1016-85-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/1016-83-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/1016-86-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/1016-340-0x0000000000140000-0x000000000018E000-memory.dmp
      Filesize

      312KB

    • memory/1016-144-0x0000000000140000-0x000000000018E000-memory.dmp
      Filesize

      312KB

    • memory/1572-74-0x0000000000000000-mapping.dmp
    • memory/1572-96-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/1572-339-0x0000000000160000-0x00000000001AE000-memory.dmp
      Filesize

      312KB

    • memory/1572-141-0x0000000000160000-0x00000000001AE000-memory.dmp
      Filesize

      312KB

    • memory/1572-121-0x0000000000160000-0x00000000001AE000-memory.dmp
      Filesize

      312KB

    • memory/1572-116-0x0000000000160000-0x00000000001AE000-memory.dmp
      Filesize

      312KB

    • memory/1692-54-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1692-67-0x0000000075831000-0x0000000075833000-memory.dmp
      Filesize

      8KB

    • memory/1692-57-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1692-103-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1692-59-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1692-55-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1692-68-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1692-60-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1692-62-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1692-64-0x0000000000404BF0-mapping.dmp
    • memory/1692-63-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1692-75-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1856-99-0x0000000000410910-mapping.dmp
    • memory/1856-127-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/1856-94-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/1856-92-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/1856-87-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/1856-90-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/1856-105-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/1856-88-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/1856-97-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/1856-104-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB