Analysis

  • max time kernel
    152s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/11/2022, 00:39

General

  • Target

    41e66affd5262f7fdfa294ad9426935d7c12ff6877ed70353b6b348b738aa1ff.exe

  • Size

    672KB

  • MD5

    ded11a6887d7eeb16cc74d9ab83453cf

  • SHA1

    cbcc234f18c68caa933391c6a7e1822dd1c42cc2

  • SHA256

    41e66affd5262f7fdfa294ad9426935d7c12ff6877ed70353b6b348b738aa1ff

  • SHA512

    38198c83c7debb3c93556bb5cc6533a10c4511a229a5e856c7c9037fc9fc8c094269a860890a238da41e0c805375fd3673755c303c4deb8360896541e4027949

  • SSDEEP

    12288:JUqxYdLKXgzNMK+IHk5OA5a5vYm0l3kxua1V09WLk8VJAgyzMaL0+hef9fC:JUqxqGc5+hOAuvB0l0c0K9WLKgyvL0+X

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • NSIS installer 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41e66affd5262f7fdfa294ad9426935d7c12ff6877ed70353b6b348b738aa1ff.exe
    "C:\Users\Admin\AppData\Local\Temp\41e66affd5262f7fdfa294ad9426935d7c12ff6877ed70353b6b348b738aa1ff.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Users\Admin\AppData\Local\Temp\dest_installer_adobe_flash_player_English.exe
      C:\Users\Admin\AppData\Local\Temp\dest_installer_adobe_flash_player_English.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4136
      • C:\Users\Admin\AppData\Local\Temp\cgcabfcfbfj.exe
        C:\Users\Admin\AppData\Local\Temp\cgcabfcfbfj.exe 9-7-7-9-6-8-5-3-5-5-3 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
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:428
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81669468660.txt bios get serialnumber
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:5116
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81669468660.txt bios get version
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3152
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81669468660.txt bios get version
          4⤵
            PID:4408
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81669468660.txt bios get version
            4⤵
              PID:3376
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic /output:C:\Users\Admin\AppData\Local\Temp\81669468660.txt bios get version
              4⤵
                PID:4252
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 956
                4⤵
                • Program crash
                PID:4152
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 428 -ip 428
          1⤵
            PID:3876

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\81669468660.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\81669468660.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81669468660.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\81669468660.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\81669468660.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\cgcabfcfbfj.exe

            Filesize

            808KB

            MD5

            6b04e4de551873580d768fa3c139a75e

            SHA1

            0675dbf10d4353967a6e205d2a7c0df50d20659b

            SHA256

            b5ed65960bef48d448443dcc977000ccad3a1ae079de8611fa89f630a9fd4c20

            SHA512

            cdcca80a76c39eb59648774cf78b73c45145e780d168815e17ccbef71847bad0d1222fe169801ae99f1b66651eba2faf3812c1802b059623da0ddb966ee4c32c

          • C:\Users\Admin\AppData\Local\Temp\cgcabfcfbfj.exe

            Filesize

            808KB

            MD5

            6b04e4de551873580d768fa3c139a75e

            SHA1

            0675dbf10d4353967a6e205d2a7c0df50d20659b

            SHA256

            b5ed65960bef48d448443dcc977000ccad3a1ae079de8611fa89f630a9fd4c20

            SHA512

            cdcca80a76c39eb59648774cf78b73c45145e780d168815e17ccbef71847bad0d1222fe169801ae99f1b66651eba2faf3812c1802b059623da0ddb966ee4c32c

          • C:\Users\Admin\AppData\Local\Temp\dest_installer_adobe_flash_player_English.exe

            Filesize

            576KB

            MD5

            421c830f7a63c1acc9826264f1a22f1a

            SHA1

            b28fd5924e94655d5ae0fce1d60cc504527102ab

            SHA256

            48d3cee119cc58a344512112b1c06b54aebadecfb2e6bb3c3bd035167ead9a20

            SHA512

            ad68ac76874188cd863a6002c34d962464fc9931c8e37573a5604e2bffbf85b6a736728aba182139767a7ce6dd82ce505ff75ce04d8100050100c82462651e7a

          • C:\Users\Admin\AppData\Local\Temp\dest_installer_adobe_flash_player_English.exe

            Filesize

            576KB

            MD5

            421c830f7a63c1acc9826264f1a22f1a

            SHA1

            b28fd5924e94655d5ae0fce1d60cc504527102ab

            SHA256

            48d3cee119cc58a344512112b1c06b54aebadecfb2e6bb3c3bd035167ead9a20

            SHA512

            ad68ac76874188cd863a6002c34d962464fc9931c8e37573a5604e2bffbf85b6a736728aba182139767a7ce6dd82ce505ff75ce04d8100050100c82462651e7a

          • C:\Users\Admin\AppData\Local\Temp\nsj1250.tmp\grz.dll

            Filesize

            125KB

            MD5

            46dc41240455f11b65e93cbdfe003eda

            SHA1

            f9cd7e13e7531cdd891e8691d247eff88daddf43

            SHA256

            3577e7c4fa2928e55c23297eab7408e1aee995c8695eee43bd05be25d3238ec2

            SHA512

            e335ba55e1e9af1dc7c32c3f0b2b94420dda0693f47a95c95f69ceebf0606eb0b6b6180c0db3c90299cb5b55a03c720b7770c5670deb5cca6e0e339da757680f

          • C:\Users\Admin\AppData\Local\Temp\nsj1250.tmp\nsisunz.dll

            Filesize

            40KB

            MD5

            5f13dbc378792f23e598079fc1e4422b

            SHA1

            5813c05802f15930aa860b8363af2b58426c8adf

            SHA256

            6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

            SHA512

            9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5