Analysis

  • max time kernel
    79s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 01:57

General

  • Target

    a39ac30c3cac43d02e7c98e281176533ff69901e0960e258e95eba9b7f74050f.exe

  • Size

    763KB

  • MD5

    29450941fc49b5d7ae5f5cd2187e3e7e

  • SHA1

    24dc493f52acffdcd896cf66ccccd6041d97d099

  • SHA256

    a39ac30c3cac43d02e7c98e281176533ff69901e0960e258e95eba9b7f74050f

  • SHA512

    448a6eb6c1079184f60369c8fd4fda5452ee7cb54f33b93f023fefebd801dd16ef0907389e9bafcc5026ad87b386f958731654afe5c83645e16341b0f052f9b8

  • SSDEEP

    12288:P6SKqT31T6WpJY6V765jKqostkm3ObvHVyKrCqDfUrt12F+z3xrKjH:CxqT31T6WE6I5jKqosOm+bfs0CqiDyeu

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a39ac30c3cac43d02e7c98e281176533ff69901e0960e258e95eba9b7f74050f.exe
    "C:\Users\Admin\AppData\Local\Temp\a39ac30c3cac43d02e7c98e281176533ff69901e0960e258e95eba9b7f74050f.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visiblity of hidden/system files in Explorer
    • Adds policy Run key to start application
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Windows\SysWOW64\csrcs.exe
      "C:\Windows\System32\csrcs.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\suicide.bat
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 5 -w 250 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:340
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\suicide.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 5 -w 250 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\suicide.bat

    Filesize

    141B

    MD5

    9d7ddbc6c331aefed77908f803fca1e5

    SHA1

    d36afa796236730342b216f083c68a39227c13bf

    SHA256

    19f0453504f36aef7d207f11345ed203440a3a8dd1594df1aa072b2f4eeb39bf

    SHA512

    014c7cb15ec0bfc96e1f5b5a66b0bba9b87440256d0e8d9106cef8c4d2f1d244a3063a7abb847957310b2e0c9db466291851d7bb2ff8e6b50e0b9ad907b9b54c

  • C:\Users\Admin\AppData\Local\Temp\suicide.bat

    Filesize

    287B

    MD5

    27c96cce9db3c61eecfcfc559dc37cc6

    SHA1

    0c7d6f526fa09a1e9c30cb0f90570b25a00951e7

    SHA256

    70a16e9fa3efe6f17a5819de37a2872847bc66fa86e4ecc52529755bb10606da

    SHA512

    a6995f521726d63d558924b9cf78d0e9b9ec8147d626f244176533c26817614a364b042990f2b64e2e85b022c0cba318dda913fbf38c34d556178917b8ca7650

  • C:\Windows\SysWOW64\csrcs.exe

    Filesize

    763KB

    MD5

    29450941fc49b5d7ae5f5cd2187e3e7e

    SHA1

    24dc493f52acffdcd896cf66ccccd6041d97d099

    SHA256

    a39ac30c3cac43d02e7c98e281176533ff69901e0960e258e95eba9b7f74050f

    SHA512

    448a6eb6c1079184f60369c8fd4fda5452ee7cb54f33b93f023fefebd801dd16ef0907389e9bafcc5026ad87b386f958731654afe5c83645e16341b0f052f9b8

  • C:\Windows\SysWOW64\csrcs.exe

    Filesize

    763KB

    MD5

    29450941fc49b5d7ae5f5cd2187e3e7e

    SHA1

    24dc493f52acffdcd896cf66ccccd6041d97d099

    SHA256

    a39ac30c3cac43d02e7c98e281176533ff69901e0960e258e95eba9b7f74050f

    SHA512

    448a6eb6c1079184f60369c8fd4fda5452ee7cb54f33b93f023fefebd801dd16ef0907389e9bafcc5026ad87b386f958731654afe5c83645e16341b0f052f9b8

  • \Windows\SysWOW64\csrcs.exe

    Filesize

    763KB

    MD5

    29450941fc49b5d7ae5f5cd2187e3e7e

    SHA1

    24dc493f52acffdcd896cf66ccccd6041d97d099

    SHA256

    a39ac30c3cac43d02e7c98e281176533ff69901e0960e258e95eba9b7f74050f

    SHA512

    448a6eb6c1079184f60369c8fd4fda5452ee7cb54f33b93f023fefebd801dd16ef0907389e9bafcc5026ad87b386f958731654afe5c83645e16341b0f052f9b8

  • \Windows\SysWOW64\csrcs.exe

    Filesize

    763KB

    MD5

    29450941fc49b5d7ae5f5cd2187e3e7e

    SHA1

    24dc493f52acffdcd896cf66ccccd6041d97d099

    SHA256

    a39ac30c3cac43d02e7c98e281176533ff69901e0960e258e95eba9b7f74050f

    SHA512

    448a6eb6c1079184f60369c8fd4fda5452ee7cb54f33b93f023fefebd801dd16ef0907389e9bafcc5026ad87b386f958731654afe5c83645e16341b0f052f9b8

  • \Windows\SysWOW64\csrcs.exe

    Filesize

    763KB

    MD5

    29450941fc49b5d7ae5f5cd2187e3e7e

    SHA1

    24dc493f52acffdcd896cf66ccccd6041d97d099

    SHA256

    a39ac30c3cac43d02e7c98e281176533ff69901e0960e258e95eba9b7f74050f

    SHA512

    448a6eb6c1079184f60369c8fd4fda5452ee7cb54f33b93f023fefebd801dd16ef0907389e9bafcc5026ad87b386f958731654afe5c83645e16341b0f052f9b8

  • \Windows\SysWOW64\csrcs.exe

    Filesize

    763KB

    MD5

    29450941fc49b5d7ae5f5cd2187e3e7e

    SHA1

    24dc493f52acffdcd896cf66ccccd6041d97d099

    SHA256

    a39ac30c3cac43d02e7c98e281176533ff69901e0960e258e95eba9b7f74050f

    SHA512

    448a6eb6c1079184f60369c8fd4fda5452ee7cb54f33b93f023fefebd801dd16ef0907389e9bafcc5026ad87b386f958731654afe5c83645e16341b0f052f9b8

  • \Windows\SysWOW64\csrcs.exe

    Filesize

    763KB

    MD5

    29450941fc49b5d7ae5f5cd2187e3e7e

    SHA1

    24dc493f52acffdcd896cf66ccccd6041d97d099

    SHA256

    a39ac30c3cac43d02e7c98e281176533ff69901e0960e258e95eba9b7f74050f

    SHA512

    448a6eb6c1079184f60369c8fd4fda5452ee7cb54f33b93f023fefebd801dd16ef0907389e9bafcc5026ad87b386f958731654afe5c83645e16341b0f052f9b8

  • \Windows\SysWOW64\csrcs.exe

    Filesize

    763KB

    MD5

    29450941fc49b5d7ae5f5cd2187e3e7e

    SHA1

    24dc493f52acffdcd896cf66ccccd6041d97d099

    SHA256

    a39ac30c3cac43d02e7c98e281176533ff69901e0960e258e95eba9b7f74050f

    SHA512

    448a6eb6c1079184f60369c8fd4fda5452ee7cb54f33b93f023fefebd801dd16ef0907389e9bafcc5026ad87b386f958731654afe5c83645e16341b0f052f9b8

  • memory/1176-54-0x00000000752B1000-0x00000000752B3000-memory.dmp

    Filesize

    8KB