Analysis

  • max time kernel
    146s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 04:23

General

  • Target

    761c471e80d3c44febc76a8f7108744fd1aa07b646d5f37c7608714c1a8c42d6.exe

  • Size

    3.2MB

  • MD5

    a87419a7b8cd42c04abc321896475347

  • SHA1

    6849c85576f911e7b4db746ceefa74845f4d7bdc

  • SHA256

    761c471e80d3c44febc76a8f7108744fd1aa07b646d5f37c7608714c1a8c42d6

  • SHA512

    47082bc2fe9aacb2dcce925c775a939c6f57cdba202dd07d7a160e5401d42e650e46c3d46d0d85aceb05d6249f1f652b16d2cd06fbfaba9eb7343676cecb1a8a

  • SSDEEP

    98304:Gc//////ArnXSjOFrpgpu4iBM2YlLatY3gb4qXzDuxTyqm:WrnXSSFrpgc41Jlmt8/qXuxT8

Malware Config

Signatures

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\761c471e80d3c44febc76a8f7108744fd1aa07b646d5f37c7608714c1a8c42d6.exe
    "C:\Users\Admin\AppData\Local\Temp\761c471e80d3c44febc76a8f7108744fd1aa07b646d5f37c7608714c1a8c42d6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\815.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\815.exe
        C:\Users\Admin\AppData\Local\Temp\815.exe
        3⤵
        • Executes dropped EXE
        • Sets DLL path for service in the registry
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:952
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\7090510.bat" "
          4⤵
            PID:1660
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "C:\Users\Admin\AppData\Local\Temp\°ÁÊÀÖбä.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Users\Admin\AppData\Local\Temp\°ÁÊÀÖбä.exe
          C:\Users\Admin\AppData\Local\Temp\°ÁÊÀÖбä.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1732
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k ipv6srvs
      1⤵
        PID:1708

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7090510.bat
        Filesize

        117B

        MD5

        ae099850d161ead2ae911c37205d8b3d

        SHA1

        36f6664acb63693a6cd00e066f7935b529c6c2f6

        SHA256

        45ba8fd3a804bef3a20c5e380775c432b36c51d221ab9f220ae44025b246e32d

        SHA512

        d8f3433e3b2a019591a2e3f46112a5fc09f76621a79690db19a99408cf5d35a04ac82066533f34da5de6ee4522b2fbaa691de209f2f370a7fb56af26ca742124

      • C:\Users\Admin\AppData\Local\Temp\815.exe
        Filesize

        122KB

        MD5

        90f14c2282b3fb8b818fde041f4904e3

        SHA1

        202e348b1e11f5b16a291de3e2b0681c58560d99

        SHA256

        38b6d3bc45441b6bd7421fc103b96dc7f655f104c2ea519964d829c93cc24665

        SHA512

        ccd1cc600e74e966f483966ddc3c1a3b4d3b7cf924c2fa01c15cf78553713f294b0c36310c39b2399ef04a84b04710c5b60144500a1d51a4487249ae64946245

      • C:\Users\Admin\AppData\Local\Temp\815.exe
        Filesize

        122KB

        MD5

        90f14c2282b3fb8b818fde041f4904e3

        SHA1

        202e348b1e11f5b16a291de3e2b0681c58560d99

        SHA256

        38b6d3bc45441b6bd7421fc103b96dc7f655f104c2ea519964d829c93cc24665

        SHA512

        ccd1cc600e74e966f483966ddc3c1a3b4d3b7cf924c2fa01c15cf78553713f294b0c36310c39b2399ef04a84b04710c5b60144500a1d51a4487249ae64946245

      • C:\Users\Admin\AppData\Local\Temp\°ÁÊÀÖбä.exe
        Filesize

        3.0MB

        MD5

        bbcccdbb736c5a8ebe506d9cead4a073

        SHA1

        ee0b2a95e162d2b927150d8640ae137a5252357d

        SHA256

        f5c1fd0e5856d672f3d17fe3d09c16024d33bd3be9f998f1d5f4cb288a1ace3f

        SHA512

        929002e4b2e9505bb9c993336f0573c862e08f7f369c2963957062c941d5f53b7187254ebc81df50e9f61d3b334849cc88bf9a8a987d3a3affa08e55faf73cdf

      • C:\Users\Admin\AppData\Local\Temp\°ÁÊÀÖбä.exe
        Filesize

        3.0MB

        MD5

        bbcccdbb736c5a8ebe506d9cead4a073

        SHA1

        ee0b2a95e162d2b927150d8640ae137a5252357d

        SHA256

        f5c1fd0e5856d672f3d17fe3d09c16024d33bd3be9f998f1d5f4cb288a1ace3f

        SHA512

        929002e4b2e9505bb9c993336f0573c862e08f7f369c2963957062c941d5f53b7187254ebc81df50e9f61d3b334849cc88bf9a8a987d3a3affa08e55faf73cdf

      • \??\c:\windows\ipv6netbrowssvc.dll
        Filesize

        122KB

        MD5

        24eed50175fc5d55463e4f1ba09dfa58

        SHA1

        920102ebf53647b8043d554a431db96bf53200fb

        SHA256

        53037c3e50d0b29b6a53accb0bf871dc0221fc857b2ff829039518cd86381a86

        SHA512

        6106c4ffb374c4c3efa2197ca6b7943b8b73d69aaf4c5cc9030846008d8223e76b7b7609b048557a9cb82479b65448f262129ef96e0869b19b0afdbfb6349d37

      • \Users\Admin\AppData\Local\Temp\815.exe
        Filesize

        122KB

        MD5

        90f14c2282b3fb8b818fde041f4904e3

        SHA1

        202e348b1e11f5b16a291de3e2b0681c58560d99

        SHA256

        38b6d3bc45441b6bd7421fc103b96dc7f655f104c2ea519964d829c93cc24665

        SHA512

        ccd1cc600e74e966f483966ddc3c1a3b4d3b7cf924c2fa01c15cf78553713f294b0c36310c39b2399ef04a84b04710c5b60144500a1d51a4487249ae64946245

      • \Users\Admin\AppData\Local\Temp\°ÁÊÀÖбä.exe
        Filesize

        3.0MB

        MD5

        bbcccdbb736c5a8ebe506d9cead4a073

        SHA1

        ee0b2a95e162d2b927150d8640ae137a5252357d

        SHA256

        f5c1fd0e5856d672f3d17fe3d09c16024d33bd3be9f998f1d5f4cb288a1ace3f

        SHA512

        929002e4b2e9505bb9c993336f0573c862e08f7f369c2963957062c941d5f53b7187254ebc81df50e9f61d3b334849cc88bf9a8a987d3a3affa08e55faf73cdf

      • memory/952-58-0x0000000000000000-mapping.dmp
      • memory/952-60-0x00000000003B1000-0x00000000003B4000-memory.dmp
        Filesize

        12KB

      • memory/952-65-0x00000000003B0000-0x00000000003EE000-memory.dmp
        Filesize

        248KB

      • memory/1660-72-0x0000000000000000-mapping.dmp
      • memory/1708-71-0x0000000074761000-0x0000000074764000-memory.dmp
        Filesize

        12KB

      • memory/1708-75-0x0000000074760000-0x000000007479E000-memory.dmp
        Filesize

        248KB

      • memory/1732-76-0x0000000000400000-0x000000000080E000-memory.dmp
        Filesize

        4.1MB

      • memory/1732-67-0x0000000075A11000-0x0000000075A13000-memory.dmp
        Filesize

        8KB

      • memory/1732-63-0x0000000000000000-mapping.dmp
      • memory/1732-74-0x0000000000400000-0x000000000080E000-memory.dmp
        Filesize

        4.1MB

      • memory/1756-68-0x0000000002070000-0x000000000247E000-memory.dmp
        Filesize

        4.1MB

      • memory/1756-57-0x0000000000000000-mapping.dmp
      • memory/2040-64-0x0000000000110000-0x000000000014E000-memory.dmp
        Filesize

        248KB

      • memory/2040-54-0x0000000000000000-mapping.dmp