Analysis

  • max time kernel
    80s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 09:10

General

  • Target

    a09635a991ac6b0bff077a7591b5d103d6c357742e8dbfd4ebf5ff39014723f7.exe

  • Size

    614KB

  • MD5

    f64b674462fd25f11ed90f6228ead772

  • SHA1

    43468d1f1c495e1d74cd273ea1d075894e1da314

  • SHA256

    a09635a991ac6b0bff077a7591b5d103d6c357742e8dbfd4ebf5ff39014723f7

  • SHA512

    033a65ef619b597332057ffc5d082e9e29e4ba257eb1a1151ea2df30d349fff0dd8b8855cd3eb571e351b6934351a96693fa0ec7ae9b3614eb85765a6990675f

  • SSDEEP

    12288:WRT0gZpHvuDZKHHw2WNWI0tTYbuMKu5R7Uw5JEAY+s:+ZpHSKHHw08b20UVAY+s

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a09635a991ac6b0bff077a7591b5d103d6c357742e8dbfd4ebf5ff39014723f7.exe
    "C:\Users\Admin\AppData\Local\Temp\a09635a991ac6b0bff077a7591b5d103d6c357742e8dbfd4ebf5ff39014723f7.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Loads dropped DLL
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\n7177\s7177.exe
      "C:\Users\Admin\AppData\Local\Temp\n7177\s7177.exe" 393d2225effce83f0c80b1eaYZljfYKfvAWsUmz+TwfwfhOo0FL8r7AQigHn/YzU+QqcFQNvvGHMAiv3cinvdf0fLywYpmYE/tNBIh4J2evjCHe97LTrdggNl8XMRic7aoNPJIOXNoqbTGlEE2vnZ6pIYK8MdCH7TpnOxiAf9ytCUAcbBakZefvYAeihJA== /v "C:\Users\Admin\AppData\Local\Temp\a09635a991ac6b0bff077a7591b5d103d6c357742e8dbfd4ebf5ff39014723f7.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n7177\s7177.exe

    Filesize

    350KB

    MD5

    54394ba7de5b2c5e3df92557ea95f014

    SHA1

    47a99735e089139495643c9027effcb6b1fc5504

    SHA256

    339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

    SHA512

    45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

  • C:\Users\Admin\AppData\Local\Temp\n7177\s7177.exe

    Filesize

    350KB

    MD5

    54394ba7de5b2c5e3df92557ea95f014

    SHA1

    47a99735e089139495643c9027effcb6b1fc5504

    SHA256

    339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

    SHA512

    45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

  • \Users\Admin\AppData\Local\Temp\n7177\s7177.exe

    Filesize

    350KB

    MD5

    54394ba7de5b2c5e3df92557ea95f014

    SHA1

    47a99735e089139495643c9027effcb6b1fc5504

    SHA256

    339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

    SHA512

    45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

  • \Users\Admin\AppData\Local\Temp\n7177\s7177.exe

    Filesize

    350KB

    MD5

    54394ba7de5b2c5e3df92557ea95f014

    SHA1

    47a99735e089139495643c9027effcb6b1fc5504

    SHA256

    339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

    SHA512

    45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

  • \Users\Admin\AppData\Local\Temp\n7177\s7177.exe

    Filesize

    350KB

    MD5

    54394ba7de5b2c5e3df92557ea95f014

    SHA1

    47a99735e089139495643c9027effcb6b1fc5504

    SHA256

    339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

    SHA512

    45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

  • \Users\Admin\AppData\Local\Temp\n7177\s7177.exe

    Filesize

    350KB

    MD5

    54394ba7de5b2c5e3df92557ea95f014

    SHA1

    47a99735e089139495643c9027effcb6b1fc5504

    SHA256

    339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

    SHA512

    45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

  • memory/1988-62-0x000007FEF40D0000-0x000007FEF4AF3000-memory.dmp

    Filesize

    10.1MB

  • memory/1988-63-0x000007FEF3030000-0x000007FEF40C6000-memory.dmp

    Filesize

    16.6MB

  • memory/1988-64-0x0000000000BE6000-0x0000000000C05000-memory.dmp

    Filesize

    124KB

  • memory/1988-65-0x0000000000BE6000-0x0000000000C05000-memory.dmp

    Filesize

    124KB

  • memory/1988-66-0x000007FEEE550000-0x000007FEEF3DF000-memory.dmp

    Filesize

    14.6MB

  • memory/1988-67-0x000007FEEE260000-0x000007FEEE54A000-memory.dmp

    Filesize

    2.9MB

  • memory/1988-68-0x0000000000BE6000-0x0000000000C05000-memory.dmp

    Filesize

    124KB

  • memory/2036-54-0x00000000767B1000-0x00000000767B3000-memory.dmp

    Filesize

    8KB