Analysis

  • max time kernel
    31s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 22:50

General

  • Target

    67382d2ccc2b1d509f43d9d51690c34ebb881148c3cba06bae8ff93ecd3ef53f.exe

  • Size

    27KB

  • MD5

    291c6983919cf96defb04dc705d71b80

  • SHA1

    ecaef7540497fadef77d80542a7633e2e7422bb8

  • SHA256

    67382d2ccc2b1d509f43d9d51690c34ebb881148c3cba06bae8ff93ecd3ef53f

  • SHA512

    96e135ad1876464c10b7f50b752b8113da501100b9fc31159a8e837ece66a9e50efdf4c925ca35379ef2a5a5c8f2a16cdf43913840e53df3348dfed70f32702d

  • SSDEEP

    768:ruM/sYxbXAVliI+xBA7fdz4qsS/eqk/k0:ruMhUbixUL9Cd

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 6 IoCs
  • Deletes itself 1 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67382d2ccc2b1d509f43d9d51690c34ebb881148c3cba06bae8ff93ecd3ef53f.exe
    "C:\Users\Admin\AppData\Local\Temp\67382d2ccc2b1d509f43d9d51690c34ebb881148c3cba06bae8ff93ecd3ef53f.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c 2.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c takeown /f "C:\Windows\syswow64"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1584
        • C:\Windows\SysWOW64\takeown.exe
          takeown /f "C:\Windows\syswow64"
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • Suspicious use of AdjustPrivilegeToken
          PID:1492
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Windows\syswow64" /grant administrators:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1312
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c 2.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c takeown /f "C:\Windows\syswow64"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\SysWOW64\takeown.exe
          takeown /f "C:\Windows\syswow64"
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:976
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Windows\syswow64" /grant administrators:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:340
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c 2.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c takeown /f "C:\Windows\syswow64"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:556
        • C:\Windows\SysWOW64\takeown.exe
          takeown /f "C:\Windows\syswow64"
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:772
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Windows\syswow64" /grant administrators:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:780
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /im "maplestory.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:300
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c 1.bat
      2⤵
      • Deletes itself
      PID:552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1.bat

    Filesize

    253B

    MD5

    b84bbc273b9c1462ea67c2c2b4685b6f

    SHA1

    60c9a5a94099c536cda8c4267f4c030b39dc1de0

    SHA256

    ee0245ba98376c0822e61c6c22424553afb8185ed1e05782b7209dfa1c5c056e

    SHA512

    d4a718708eb0e79858d81c5b6a3c2135507ad853c0aba9e5578e4c49fd0a36fd873c46241af29f49ec01f2f78a2a845be1266774fe745cf0a0a7e5bf269c5d3e

  • C:\Users\Admin\AppData\Local\Temp\2.bat

    Filesize

    110B

    MD5

    521e37256443e6b3f2281f217476bf79

    SHA1

    81f0e2b65605f070782cbe241569c6b9a25bb9dc

    SHA256

    79ae97b29c3a714fa32b14c282716f1378ad8de73d6a6d954fdd7e1270bc411f

    SHA512

    23096a5eee45c7f2b278cf9385a0ea91b86c01332a096e56f1c8de336ca0bba77e0b1dbb6f2197b5c6a91c2ca093df356026c6452e4a022db79a6b555cb39025

  • C:\Users\Admin\AppData\Local\Temp\2.bat

    Filesize

    110B

    MD5

    521e37256443e6b3f2281f217476bf79

    SHA1

    81f0e2b65605f070782cbe241569c6b9a25bb9dc

    SHA256

    79ae97b29c3a714fa32b14c282716f1378ad8de73d6a6d954fdd7e1270bc411f

    SHA512

    23096a5eee45c7f2b278cf9385a0ea91b86c01332a096e56f1c8de336ca0bba77e0b1dbb6f2197b5c6a91c2ca093df356026c6452e4a022db79a6b555cb39025

  • C:\Users\Admin\AppData\Local\Temp\2.bat

    Filesize

    110B

    MD5

    521e37256443e6b3f2281f217476bf79

    SHA1

    81f0e2b65605f070782cbe241569c6b9a25bb9dc

    SHA256

    79ae97b29c3a714fa32b14c282716f1378ad8de73d6a6d954fdd7e1270bc411f

    SHA512

    23096a5eee45c7f2b278cf9385a0ea91b86c01332a096e56f1c8de336ca0bba77e0b1dbb6f2197b5c6a91c2ca093df356026c6452e4a022db79a6b555cb39025

  • C:\Windows\SysWOW64\dllcache\iphlpapi.dll

    Filesize

    101KB

    MD5

    f088aa0e173faa91bf4c9d7f03e19173

    SHA1

    4a41aa76adda7c1b9807e371d1b823322747bd3d

    SHA256

    1f1ca4f9eb93766253ddea4f6e010948b8a3048c63a580a6d2765ed959a3d98b

    SHA512

    8d97a0220116a422197da0528e0c542d133dd9e56d56c5e78b96ac8c9a59d188fcb945f2138d1530610b7887e91da4080c7c483cd1dcde4861d5d01224fecc12

  • C:\Windows\SysWOW64\dllcache\rasadhlp.dll

    Filesize

    11KB

    MD5

    f96c585709ec7596c14afa3a60fa9d7a

    SHA1

    681c1cc117abefb3c84ce78df002a43420fd8b6c

    SHA256

    2d7dec9af8ef7e6458417c0d66d5277c0c9642ffe126195a2db43cb81f192f03

    SHA512

    eb377b2e57dca47619849b67579c5716d9fc4959d0bf8471f49b3bd54afb6ab89bb928c8868191ea59be4c8541a9bd91490c6c60d15470d57c1b8a0df8d892a4

  • C:\Windows\SysWOW64\iphlpapi.dll

    Filesize

    101KB

    MD5

    f088aa0e173faa91bf4c9d7f03e19173

    SHA1

    4a41aa76adda7c1b9807e371d1b823322747bd3d

    SHA256

    1f1ca4f9eb93766253ddea4f6e010948b8a3048c63a580a6d2765ed959a3d98b

    SHA512

    8d97a0220116a422197da0528e0c542d133dd9e56d56c5e78b96ac8c9a59d188fcb945f2138d1530610b7887e91da4080c7c483cd1dcde4861d5d01224fecc12

  • C:\Windows\SysWOW64\rasadhlp.dll

    Filesize

    11KB

    MD5

    f96c585709ec7596c14afa3a60fa9d7a

    SHA1

    681c1cc117abefb3c84ce78df002a43420fd8b6c

    SHA256

    2d7dec9af8ef7e6458417c0d66d5277c0c9642ffe126195a2db43cb81f192f03

    SHA512

    eb377b2e57dca47619849b67579c5716d9fc4959d0bf8471f49b3bd54afb6ab89bb928c8868191ea59be4c8541a9bd91490c6c60d15470d57c1b8a0df8d892a4

  • memory/268-63-0x0000000000000000-mapping.dmp

  • memory/300-81-0x0000000000000000-mapping.dmp

  • memory/340-67-0x0000000000000000-mapping.dmp

  • memory/552-82-0x0000000000000000-mapping.dmp

  • memory/556-75-0x0000000000000000-mapping.dmp

  • memory/772-76-0x0000000000000000-mapping.dmp

  • memory/780-77-0x0000000000000000-mapping.dmp

  • memory/836-73-0x0000000000000000-mapping.dmp

  • memory/844-61-0x00000000741D1000-0x00000000741D3000-memory.dmp

    Filesize

    8KB

  • memory/844-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB

  • memory/844-60-0x0000000074381000-0x0000000074383000-memory.dmp

    Filesize

    8KB

  • memory/976-66-0x0000000000000000-mapping.dmp

  • memory/1312-59-0x0000000000000000-mapping.dmp

  • memory/1492-58-0x0000000000000000-mapping.dmp

  • memory/1584-57-0x0000000000000000-mapping.dmp

  • memory/1688-65-0x0000000000000000-mapping.dmp

  • memory/1712-55-0x0000000000000000-mapping.dmp