Analysis

  • max time kernel
    55s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 23:05

General

  • Target

    235b6923a233219747ef055aef038d7c601747c94cd60ae7e8451844206fe486.exe

  • Size

    5.1MB

  • MD5

    8a97fbc511ca574924ab5375b9554653

  • SHA1

    a3708062c84c0022caedaf95b13846a886803cc8

  • SHA256

    235b6923a233219747ef055aef038d7c601747c94cd60ae7e8451844206fe486

  • SHA512

    a9fc67d4a8602fba238d3cb0dacfa03f3ca268fe1fa7b8e61bad546274fabfdaef18e8a612c8c67d89633611fb26d18201dfdca180d603d61c959feafb782ed6

  • SSDEEP

    98304:Og56Gel9Qv4omnSS5BX/Y1lQzL0nGY0d/4J46KdLBCBgNQZ2V9FTQZE:l5l4o2SE61+zLmG1dw2fC/Z2VnQZE

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\235b6923a233219747ef055aef038d7c601747c94cd60ae7e8451844206fe486.exe
    "C:\Users\Admin\AppData\Local\Temp\235b6923a233219747ef055aef038d7c601747c94cd60ae7e8451844206fe486.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Users\Admin\AppData\Local\Temp\235b6923a233219747ef055aef038d7c601747c94cd60ae7e8451844206fe486.exe
      "C:\Users\Admin\AppData\Local\Temp\235b6923a233219747ef055aef038d7c601747c94cd60ae7e8451844206fe486.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1968

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/800-54-0x0000000075521000-0x0000000075523000-memory.dmp
    Filesize

    8KB

  • memory/1968-55-0x0000000000AC0000-0x0000000000F74000-memory.dmp
    Filesize

    4.7MB

  • memory/1968-57-0x0000000000AC0000-0x0000000000F74000-memory.dmp
    Filesize

    4.7MB

  • memory/1968-58-0x0000000000D69304-mapping.dmp
  • memory/1968-59-0x0000000000AC0000-0x0000000000F74000-memory.dmp
    Filesize

    4.7MB

  • memory/1968-61-0x0000000000AC0000-0x0000000000F74000-memory.dmp
    Filesize

    4.7MB

  • memory/1968-62-0x0000000000AC0000-0x0000000000F74000-memory.dmp
    Filesize

    4.7MB

  • memory/1968-63-0x0000000000AC0000-0x0000000000F74000-memory.dmp
    Filesize

    4.7MB