Analysis

  • max time kernel
    150s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 07:13

General

  • Target

    03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee.exe

  • Size

    686KB

  • MD5

    c4884c93e73f7af897b8a63e5fbcb555

  • SHA1

    e933775937ac9435e26ea818a550959535443398

  • SHA256

    03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee

  • SHA512

    7fd0690c9cfe7dd3033fe6af99a6a6bbad40c0fc347dd4f02866a98af0a03dc1b3602432b53a453a3fa684ad3669c760284e29bff7be09dcee9c5453a3fab824

  • SSDEEP

    12288:/2LhQ2kWt0nFuaPPONSLVZaqRLPCKHt3ajJuB9/c8Rg63L363jLIgnIxm:/uC2WFzPXhZHPt3sJuTc8RgFb

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee.exe
    "C:\Users\Admin\AppData\Local\Temp\03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • NTFS ADS
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee.exe":ZONE.identifier & exit
      2⤵
      • NTFS ADS
      PID:1120
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Update\Windows" /XML "C:\Users\Admin\AppData\Local\Temp\1711874231.xml"
      2⤵
      • Creates scheduled task(s)
      PID:892
    • C:\Users\Admin\AppData\Local\Temp\03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee.exe
      "C:\Users\Admin\AppData\Local\Temp\03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee.exe"
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1748
    • C:\Users\Admin\AppData\Local\Temp\csrss.exe
      "C:\Users\Admin\AppData\Local\Temp\csrss.exe" -prochide 1748
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1452

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9f23901167a571168a9bb97222836277

          SHA1

          2c9404b596fb3a46c6ac4eccce6f64735136299d

          SHA256

          d8f251f0afe3469eaa8a8880c7d6261a62f811588faa78adde4835e77b2c8071

          SHA512

          e3a40a1f6b808ed684d2e33473a42ffd9d9cf8dab6ac783fa50bff9bccccd58a5ba70c89c011423810408eac60230445653c96cec6785dc70a18f438cd5be1e1

        • C:\Users\Admin\AppData\Local\Temp\03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee.exe

          Filesize

          686KB

          MD5

          c4884c93e73f7af897b8a63e5fbcb555

          SHA1

          e933775937ac9435e26ea818a550959535443398

          SHA256

          03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee

          SHA512

          7fd0690c9cfe7dd3033fe6af99a6a6bbad40c0fc347dd4f02866a98af0a03dc1b3602432b53a453a3fa684ad3669c760284e29bff7be09dcee9c5453a3fab824

        • C:\Users\Admin\AppData\Local\Temp\03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee.exe

          Filesize

          686KB

          MD5

          c4884c93e73f7af897b8a63e5fbcb555

          SHA1

          e933775937ac9435e26ea818a550959535443398

          SHA256

          03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee

          SHA512

          7fd0690c9cfe7dd3033fe6af99a6a6bbad40c0fc347dd4f02866a98af0a03dc1b3602432b53a453a3fa684ad3669c760284e29bff7be09dcee9c5453a3fab824

        • C:\Users\Admin\AppData\Local\Temp\1711874231.xml

          Filesize

          1KB

          MD5

          5fec1f39a35489e480ac136801d751aa

          SHA1

          a80ae4780bc4abf1edd5cacec3c2fd6d5cb8d0bb

          SHA256

          c672ec8268259f3d52a1b074a881caabffe825101d9257ad9f8da83bb4d9d8b8

          SHA512

          93b044cc5359deb3f641e3435db2e645b38aab129c1c429b5aa02c33d7b39f620c036447d86477efcf0b464486437ebd281bd9290f5af8026e82382363bda804

        • C:\Users\Admin\AppData\Local\Temp\csrss.exe

          Filesize

          686KB

          MD5

          c4884c93e73f7af897b8a63e5fbcb555

          SHA1

          e933775937ac9435e26ea818a550959535443398

          SHA256

          03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee

          SHA512

          7fd0690c9cfe7dd3033fe6af99a6a6bbad40c0fc347dd4f02866a98af0a03dc1b3602432b53a453a3fa684ad3669c760284e29bff7be09dcee9c5453a3fab824

        • C:\Users\Admin\AppData\Local\Temp\csrss.exe

          Filesize

          686KB

          MD5

          c4884c93e73f7af897b8a63e5fbcb555

          SHA1

          e933775937ac9435e26ea818a550959535443398

          SHA256

          03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee

          SHA512

          7fd0690c9cfe7dd3033fe6af99a6a6bbad40c0fc347dd4f02866a98af0a03dc1b3602432b53a453a3fa684ad3669c760284e29bff7be09dcee9c5453a3fab824

        • \Users\Admin\AppData\Local\Temp\03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee.exe

          Filesize

          686KB

          MD5

          c4884c93e73f7af897b8a63e5fbcb555

          SHA1

          e933775937ac9435e26ea818a550959535443398

          SHA256

          03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee

          SHA512

          7fd0690c9cfe7dd3033fe6af99a6a6bbad40c0fc347dd4f02866a98af0a03dc1b3602432b53a453a3fa684ad3669c760284e29bff7be09dcee9c5453a3fab824

        • \Users\Admin\AppData\Local\Temp\csrss.exe

          Filesize

          686KB

          MD5

          c4884c93e73f7af897b8a63e5fbcb555

          SHA1

          e933775937ac9435e26ea818a550959535443398

          SHA256

          03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee

          SHA512

          7fd0690c9cfe7dd3033fe6af99a6a6bbad40c0fc347dd4f02866a98af0a03dc1b3602432b53a453a3fa684ad3669c760284e29bff7be09dcee9c5453a3fab824

        • \Users\Admin\AppData\Local\Temp\csrss.exe

          Filesize

          686KB

          MD5

          c4884c93e73f7af897b8a63e5fbcb555

          SHA1

          e933775937ac9435e26ea818a550959535443398

          SHA256

          03dfd925b116ae0e233d3f3f8f7c909a327b01f4709163614a394fedeed0fcee

          SHA512

          7fd0690c9cfe7dd3033fe6af99a6a6bbad40c0fc347dd4f02866a98af0a03dc1b3602432b53a453a3fa684ad3669c760284e29bff7be09dcee9c5453a3fab824

        • memory/832-56-0x00000000741F0000-0x000000007479B000-memory.dmp

          Filesize

          5.7MB

        • memory/832-55-0x00000000741F0000-0x000000007479B000-memory.dmp

          Filesize

          5.7MB

        • memory/832-54-0x0000000075701000-0x0000000075703000-memory.dmp

          Filesize

          8KB

        • memory/832-89-0x00000000741F0000-0x000000007479B000-memory.dmp

          Filesize

          5.7MB

        • memory/1452-98-0x00000000741F0000-0x000000007479B000-memory.dmp

          Filesize

          5.7MB

        • memory/1452-115-0x00000000741F0000-0x000000007479B000-memory.dmp

          Filesize

          5.7MB

        • memory/1748-68-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-65-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-79-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-74-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-72-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-70-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-90-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-92-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-91-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-93-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-95-0x00000000741F0000-0x000000007479B000-memory.dmp

          Filesize

          5.7MB

        • memory/1748-94-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-80-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-63-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-97-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-96-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-102-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-101-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-104-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-107-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-106-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-111-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-110-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-113-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-114-0x00000000741F0000-0x000000007479B000-memory.dmp

          Filesize

          5.7MB

        • memory/1748-62-0x0000000000400000-0x000000000049C000-memory.dmp

          Filesize

          624KB

        • memory/1748-116-0x00000000741F0000-0x000000007479B000-memory.dmp

          Filesize

          5.7MB