Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 00:19

General

  • Target

    6a4a5f8cfab03293281591a6c10f874d9599558925bc5eead70fe14fda6bc91a.exe

  • Size

    122KB

  • MD5

    de3abc441c3093de4c2a54b0e9cf828e

  • SHA1

    260247cb09238b20188b04f71f7a0058cb9c45e6

  • SHA256

    6a4a5f8cfab03293281591a6c10f874d9599558925bc5eead70fe14fda6bc91a

  • SHA512

    e091b7b03b3ad94039b99c1eed65b4f3ec9ca2c2ed8bbc870622aea1a91252ca6bdfb15f8143772d46d236ca3c7f78ddd8a6608403764bc6f40ad1d3bd0791d1

  • SSDEEP

    3072:tnDHH47khTSHz4dwqKdM6i4JGpZh37uLjudqz9d0k2:tDn440zt46i4EruLork2

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a4a5f8cfab03293281591a6c10f874d9599558925bc5eead70fe14fda6bc91a.exe
    "C:\Users\Admin\AppData\Local\Temp\6a4a5f8cfab03293281591a6c10f874d9599558925bc5eead70fe14fda6bc91a.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7079855.bat" "
      2⤵
      • Deletes itself
      PID:1616
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k ipv6srvs
    1⤵
      PID:1156

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7079855.bat
      Filesize

      239B

      MD5

      33fdc01cb9d3277a1760c5f5d49305ab

      SHA1

      f7c7a6613d3c4bbf07ea810172d73623ff4317da

      SHA256

      c42ad84d9d998ecb665f0a176ec1ef62e872da26cba398eefa0b6a2cc1da7ae5

      SHA512

      37330d36be4bedf33523abed61de1170f068ed83165c7717d9d22e8613243405c1ef2d6504d792683a06f6d16bb501cb1299c7c659776052d56598737b75740a

    • \??\c:\windows\ipv6netbrowssvc.dll
      Filesize

      122KB

      MD5

      0dd215fbdc6e7bf775a736d9edb21684

      SHA1

      2805979013e1f8c5ec5faff0d458d9215a85d875

      SHA256

      e244d56be4020b52c0c9dd92f9ab1fe1a73b2cf6ed998aabfd1fdbdfbcb1bc54

      SHA512

      57214d1d505ff9db912f90fbcafef045fecf2481cb411e95b2e249e446658a4c1f61dcceccf6d3377fe0fe6d6dea3f279586cdee5384952a481d254903e1bad7

    • memory/1156-57-0x0000000074DC1000-0x0000000074DC4000-memory.dmp
      Filesize

      12KB

    • memory/1156-61-0x0000000074DC0000-0x0000000074DFE000-memory.dmp
      Filesize

      248KB

    • memory/1156-62-0x0000000074DC0000-0x0000000074DFE000-memory.dmp
      Filesize

      248KB

    • memory/1600-54-0x0000000000A41000-0x0000000000A44000-memory.dmp
      Filesize

      12KB

    • memory/1600-56-0x0000000076461000-0x0000000076463000-memory.dmp
      Filesize

      8KB

    • memory/1600-59-0x0000000000A40000-0x0000000000A7E000-memory.dmp
      Filesize

      248KB

    • memory/1616-58-0x0000000000000000-mapping.dmp