Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 00:23

General

  • Target

    159a813d4006b7432586ec22ae953e74da52555c1f96405d37dc7540f95201f2.exe

  • Size

    1.0MB

  • MD5

    79859066ed2d4203ded1e1265e0019dd

  • SHA1

    172ea47101a85912d0547a28225858c6d0922d6c

  • SHA256

    159a813d4006b7432586ec22ae953e74da52555c1f96405d37dc7540f95201f2

  • SHA512

    fa7b3e024fc0cf5a23d6970840a4c02a84a9cea57058e98fb8568268b33fd47e8524b62b1a16c2b56ddccaaa65b864879ace0cda492454ba4281d85c5a1bf456

  • SSDEEP

    24576:l4lavt0LkLL9IMixoEgeaaHLNU4QFtq9MmCS:8kwkn9IMHea4LNUPraPCS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\159a813d4006b7432586ec22ae953e74da52555c1f96405d37dc7540f95201f2.exe
    "C:\Users\Admin\AppData\Local\Temp\159a813d4006b7432586ec22ae953e74da52555c1f96405d37dc7540f95201f2.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Windows\jpg.exe
      C:\Windows/jpg.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Windows\jpg.exe" "jpg.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:756
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    PID:1444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\jpg.exe

    Filesize

    195KB

    MD5

    5afe4ffe5e604852837f08e740dc8b10

    SHA1

    3fd7f573333455ddc33caa10d91ef429e5791aa9

    SHA256

    1acee4ca0c10273e19085df3a7437aaf46a9b818bfdddad4d7d9aa03970ba605

    SHA512

    8b4709dc7f45b0296b65cd6cd1deec85a5c127f1a91ea64f887ba9c670cbe54e79f55a2a0ae85c4b269a0322a4f1a9f19f4dba641c0fa16599782afae8fce74a

  • C:\Windows\jpg.exe

    Filesize

    195KB

    MD5

    5afe4ffe5e604852837f08e740dc8b10

    SHA1

    3fd7f573333455ddc33caa10d91ef429e5791aa9

    SHA256

    1acee4ca0c10273e19085df3a7437aaf46a9b818bfdddad4d7d9aa03970ba605

    SHA512

    8b4709dc7f45b0296b65cd6cd1deec85a5c127f1a91ea64f887ba9c670cbe54e79f55a2a0ae85c4b269a0322a4f1a9f19f4dba641c0fa16599782afae8fce74a

  • C:\Windows\nn.JPG

    Filesize

    52KB

    MD5

    ad9624c05aa5f092256ca8a51e56db67

    SHA1

    9b95434ad1de4690c2a024e1f32a339537dbb6b4

    SHA256

    9fa2c909bb2565120d1988717b48d455c9adb911b23dfa1ec805bf7e00de696e

    SHA512

    cfc5f51f7de155eb071da86b9cb3828f7df4a23b962c88f78d070211d312fa07735f94bdf790eafd708a7982e0f8ca633c8dff4965e6b8f00509a4d540b0304f

  • memory/1508-54-0x0000000075451000-0x0000000075453000-memory.dmp

    Filesize

    8KB

  • memory/1680-60-0x0000000073180000-0x000000007372B000-memory.dmp

    Filesize

    5.7MB

  • memory/1680-64-0x0000000073180000-0x000000007372B000-memory.dmp

    Filesize

    5.7MB