Analysis

  • max time kernel
    44s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 12:38

General

  • Target

    43011d822451b210e6532fa0736ac196cdc64c196d2d1f2f876035c7c3c476c0.exe

  • Size

    1.2MB

  • MD5

    174382a91a1a79be940f97befb379758

  • SHA1

    bade41a40a3114a525732fcb261ff03546fbaeab

  • SHA256

    43011d822451b210e6532fa0736ac196cdc64c196d2d1f2f876035c7c3c476c0

  • SHA512

    a72e3e43b2c1c6facfc2e92255efba5ddd25876a612cc430045f312e192127fd5ad6174fea2bca159d40fa30a1c40e781b1b830fd60138f0ddc7006e2ee8035c

  • SSDEEP

    24576:ARJ7/hVYXfCxS4y25pdA+UnJFqnb1QGRuYai9T8b+XN:ARJNVMfCxSUhA9Fqb1D8YaB+d

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43011d822451b210e6532fa0736ac196cdc64c196d2d1f2f876035c7c3c476c0.exe
    "C:\Users\Admin\AppData\Local\Temp\43011d822451b210e6532fa0736ac196cdc64c196d2d1f2f876035c7c3c476c0.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Users\Admin\AppData\Local\Temp\SQ ÔÆÐÂÎÅ.exe
      "C:\Users\Admin\AppData\Local\Temp\\SQ ÔÆÐÂÎÅ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SQ ÔÆÐÂÎÅ.exe
    Filesize

    224KB

    MD5

    d3ac5fe660b6aebdc61ac8ef6d20e417

    SHA1

    7f9f95ad571cecddecc6ce7e930ce53fcaef326a

    SHA256

    9a0b419550fb26aa732b326d673c4861133a94bb1fe6dc6936c9d104b31eef19

    SHA512

    85b01bb31f6a37c4f46938282a5b5f2b91d7e46f8494b49434c168c207a6e84cc1340733dbde07532a3755f03f6d7614c076ca92bbe26c150e2ae8d5f0f706f7

  • C:\Users\Admin\AppData\Local\Temp\SQ ÔÆÐÂÎÅ.exe
    Filesize

    224KB

    MD5

    d3ac5fe660b6aebdc61ac8ef6d20e417

    SHA1

    7f9f95ad571cecddecc6ce7e930ce53fcaef326a

    SHA256

    9a0b419550fb26aa732b326d673c4861133a94bb1fe6dc6936c9d104b31eef19

    SHA512

    85b01bb31f6a37c4f46938282a5b5f2b91d7e46f8494b49434c168c207a6e84cc1340733dbde07532a3755f03f6d7614c076ca92bbe26c150e2ae8d5f0f706f7

  • \Users\Admin\AppData\Local\Temp\SQ ÔÆÐÂÎÅ.exe
    Filesize

    224KB

    MD5

    d3ac5fe660b6aebdc61ac8ef6d20e417

    SHA1

    7f9f95ad571cecddecc6ce7e930ce53fcaef326a

    SHA256

    9a0b419550fb26aa732b326d673c4861133a94bb1fe6dc6936c9d104b31eef19

    SHA512

    85b01bb31f6a37c4f46938282a5b5f2b91d7e46f8494b49434c168c207a6e84cc1340733dbde07532a3755f03f6d7614c076ca92bbe26c150e2ae8d5f0f706f7

  • \Users\Admin\AppData\Local\Temp\SQ ÔÆÐÂÎÅ.exe
    Filesize

    224KB

    MD5

    d3ac5fe660b6aebdc61ac8ef6d20e417

    SHA1

    7f9f95ad571cecddecc6ce7e930ce53fcaef326a

    SHA256

    9a0b419550fb26aa732b326d673c4861133a94bb1fe6dc6936c9d104b31eef19

    SHA512

    85b01bb31f6a37c4f46938282a5b5f2b91d7e46f8494b49434c168c207a6e84cc1340733dbde07532a3755f03f6d7614c076ca92bbe26c150e2ae8d5f0f706f7

  • \Users\Admin\AppData\Local\Temp\SQ ÔÆÐÂÎÅ.exe
    Filesize

    224KB

    MD5

    d3ac5fe660b6aebdc61ac8ef6d20e417

    SHA1

    7f9f95ad571cecddecc6ce7e930ce53fcaef326a

    SHA256

    9a0b419550fb26aa732b326d673c4861133a94bb1fe6dc6936c9d104b31eef19

    SHA512

    85b01bb31f6a37c4f46938282a5b5f2b91d7e46f8494b49434c168c207a6e84cc1340733dbde07532a3755f03f6d7614c076ca92bbe26c150e2ae8d5f0f706f7

  • memory/1340-91-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-77-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-71-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-75-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-79-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-83-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-89-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-93-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-95-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-99-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-97-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-54-0x00000000758B1000-0x00000000758B3000-memory.dmp
    Filesize

    8KB

  • memory/1340-87-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-85-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-81-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-67-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-73-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-69-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-63-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-58-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-100-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-65-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-61-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-111-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-59-0x0000000010000000-0x0000000010038000-memory.dmp
    Filesize

    224KB

  • memory/1340-57-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1340-55-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1340-110-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1928-109-0x0000000035110000-0x0000000035120000-memory.dmp
    Filesize

    64KB

  • memory/1928-102-0x0000000000000000-mapping.dmp