Analysis

  • max time kernel
    392s
  • max time network
    445s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 15:33

General

  • Target

    5e6f2307292e2044bb2337444709d928c7cf90a8ebcf4fa7947451007fff71cd.exe

  • Size

    405KB

  • MD5

    2d8d691ccebd25cbbf801a519b964a5b

  • SHA1

    1af7a3d27ff8567f9f64bb94bdd4fbdb10c8d0bc

  • SHA256

    5e6f2307292e2044bb2337444709d928c7cf90a8ebcf4fa7947451007fff71cd

  • SHA512

    8d8005199f698271d28a160ded7e439f1f278a608b5a5d7dc3b1df91c1c449a88f6808ab6c2dbb342656c8eaea9d7b68375af7e18502afb0acf04156e5e5b50c

  • SSDEEP

    12288:VkqanzfVnl6VCB+lHOWbtOBEtV1H8UTAti5:VkqanhoAyx2Vc5

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 8 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e6f2307292e2044bb2337444709d928c7cf90a8ebcf4fa7947451007fff71cd.exe
    "C:\Users\Admin\AppData\Local\Temp\5e6f2307292e2044bb2337444709d928c7cf90a8ebcf4fa7947451007fff71cd.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3104
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Adds policy Run key to start application
      • Adds Run key to start application
      PID:3384
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:5020

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    2
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\InstallDir\Server.exe
      Filesize

      405KB

      MD5

      2d8d691ccebd25cbbf801a519b964a5b

      SHA1

      1af7a3d27ff8567f9f64bb94bdd4fbdb10c8d0bc

      SHA256

      5e6f2307292e2044bb2337444709d928c7cf90a8ebcf4fa7947451007fff71cd

      SHA512

      8d8005199f698271d28a160ded7e439f1f278a608b5a5d7dc3b1df91c1c449a88f6808ab6c2dbb342656c8eaea9d7b68375af7e18502afb0acf04156e5e5b50c

    • memory/3384-132-0x0000000000000000-mapping.dmp
    • memory/3384-133-0x0000000000400000-0x000000000046F000-memory.dmp
      Filesize

      444KB

    • memory/3384-135-0x0000000000400000-0x000000000046F000-memory.dmp
      Filesize

      444KB