Analysis

  • max time kernel
    47s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 13:42

General

  • Target

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1.exe

  • Size

    997KB

  • MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

  • SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

  • SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

  • SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • SSDEEP

    24576:jqV/j/+lmGe4OdLgeH2UGO7+HPE9Ic5mMP3rp:jNWdLgeH2jS+HrS

Score
9/10

Malware Config

Signatures

  • NirSoft MailPassView 7 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 7 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 7 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1.exe
    "C:\Users\Admin\AppData\Local\Temp\c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1.exe
      "C:\Users\Admin\AppData\Local\Temp\c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:316
      • C:\Users\Admin\AppData\Roaming\Windows Update.exe
        "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1828
        • C:\Users\Admin\AppData\Roaming\Windows Update.exe
          "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
          4⤵
          • Executes dropped EXE
          PID:692
        • C:\Users\Admin\AppData\Roaming\Windows Update.exe
          "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
          4⤵
          • Executes dropped EXE
          PID:832
        • C:\Users\Admin\AppData\Roaming\Windows Update.exe
          "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
          4⤵
          • Executes dropped EXE
          PID:2012
        • C:\Users\Admin\AppData\Roaming\Windows Update.exe
          "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
          4⤵
          • Executes dropped EXE
          PID:776
        • C:\Users\Admin\AppData\Roaming\Windows Update.exe
          "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
          4⤵
          • Executes dropped EXE
          PID:2008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Windows Update.exe

    Filesize

    997KB

    MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

    SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

    SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

    SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • C:\Users\Admin\AppData\Roaming\Windows Update.exe

    Filesize

    997KB

    MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

    SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

    SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

    SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • C:\Users\Admin\AppData\Roaming\Windows Update.exe

    Filesize

    997KB

    MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

    SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

    SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

    SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • C:\Users\Admin\AppData\Roaming\Windows Update.exe

    Filesize

    997KB

    MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

    SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

    SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

    SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • C:\Users\Admin\AppData\Roaming\Windows Update.exe

    Filesize

    997KB

    MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

    SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

    SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

    SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • C:\Users\Admin\AppData\Roaming\Windows Update.exe

    Filesize

    997KB

    MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

    SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

    SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

    SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • C:\Users\Admin\AppData\Roaming\Windows Update.exe

    Filesize

    997KB

    MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

    SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

    SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

    SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • \Users\Admin\AppData\Roaming\Windows Update.exe

    Filesize

    997KB

    MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

    SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

    SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

    SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • \Users\Admin\AppData\Roaming\Windows Update.exe

    Filesize

    997KB

    MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

    SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

    SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

    SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • \Users\Admin\AppData\Roaming\Windows Update.exe

    Filesize

    997KB

    MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

    SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

    SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

    SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • \Users\Admin\AppData\Roaming\Windows Update.exe

    Filesize

    997KB

    MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

    SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

    SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

    SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • \Users\Admin\AppData\Roaming\Windows Update.exe

    Filesize

    997KB

    MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

    SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

    SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

    SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • \Users\Admin\AppData\Roaming\Windows Update.exe

    Filesize

    997KB

    MD5

    cbff5c0aa4f33d3485c1c5a118daec7f

    SHA1

    7ec996900ccdf3eb06b33eea35e834861daecfbc

    SHA256

    c019cd5d76e0954de518e73a8960ed1bdc4d917c90ac45a137d49e7347044de1

    SHA512

    dfd279f65c097d022ba24cd27f6f6fdb8068170a35b2b72b8855aeaa46c5fcb4af7b1d0fe92c4630d35ab620364a5418c7131f0a84acec2833ae1d562d87508d

  • memory/316-65-0x0000000000400000-0x00000000004F0000-memory.dmp

    Filesize

    960KB

  • memory/316-59-0x0000000000400000-0x00000000004F0000-memory.dmp

    Filesize

    960KB

  • memory/316-58-0x0000000000400000-0x00000000004F0000-memory.dmp

    Filesize

    960KB

  • memory/316-56-0x0000000000400000-0x00000000004F0000-memory.dmp

    Filesize

    960KB

  • memory/316-68-0x0000000073D10000-0x00000000742BB000-memory.dmp

    Filesize

    5.7MB

  • memory/316-74-0x0000000073D10000-0x00000000742BB000-memory.dmp

    Filesize

    5.7MB

  • memory/316-63-0x0000000000400000-0x00000000004F0000-memory.dmp

    Filesize

    960KB

  • memory/316-61-0x00000000004EB1AE-mapping.dmp

  • memory/316-60-0x0000000000400000-0x00000000004F0000-memory.dmp

    Filesize

    960KB

  • memory/316-55-0x0000000000400000-0x00000000004F0000-memory.dmp

    Filesize

    960KB

  • memory/1724-87-0x00000000742C0000-0x000000007486B000-memory.dmp

    Filesize

    5.7MB

  • memory/1724-54-0x0000000074DC1000-0x0000000074DC3000-memory.dmp

    Filesize

    8KB

  • memory/1724-66-0x00000000742C0000-0x000000007486B000-memory.dmp

    Filesize

    5.7MB

  • memory/1828-76-0x0000000073D10000-0x00000000742BB000-memory.dmp

    Filesize

    5.7MB

  • memory/1828-70-0x0000000000000000-mapping.dmp

  • memory/1828-86-0x0000000073D10000-0x00000000742BB000-memory.dmp

    Filesize

    5.7MB