Analysis

  • max time kernel
    152s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 22:56

General

  • Target

    cc40ef1abd1bcf08676f53290e4374dba4e265cdc37097df9b57d8d4e96b846f.exe

  • Size

    2.6MB

  • MD5

    96e239c85b8f12bce6901d73ee8c00f1

  • SHA1

    bd2566ccd1c8317c0ce341259a7e3ceb07c8b118

  • SHA256

    cc40ef1abd1bcf08676f53290e4374dba4e265cdc37097df9b57d8d4e96b846f

  • SHA512

    624d3c7748ceab148a081ceacfca42b595d08d302fbfed441e391bbacf118563a8402a0f43f4837c3933e8eb0e3596f053fd188d44ceaf49e5e73f8fc7f9158b

  • SSDEEP

    49152:2toK3MJgWJfjRiFqpfSdXYjy0n4w1Ou8HG3WE/OWwcBEP2KHgDfcg+QVX1mEsMFE:qMisiFq4XYm091OufGPLclKHUcgnVQc6

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc40ef1abd1bcf08676f53290e4374dba4e265cdc37097df9b57d8d4e96b846f.exe
    "C:\Users\Admin\AppData\Local\Temp\cc40ef1abd1bcf08676f53290e4374dba4e265cdc37097df9b57d8d4e96b846f.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd /c rd "C:\Windows\system32\drivers\etcdjqGL" /S /Q
      2⤵
        PID:1072

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/752-54-0x0000000075D01000-0x0000000075D03000-memory.dmp

      Filesize

      8KB

    • memory/752-55-0x0000000000400000-0x0000000000848000-memory.dmp

      Filesize

      4.3MB

    • memory/752-57-0x0000000000400000-0x0000000000848000-memory.dmp

      Filesize

      4.3MB

    • memory/1072-56-0x0000000000000000-mapping.dmp