Analysis

  • max time kernel
    136s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 09:35

General

  • Target

    afab9fcff33d4f9761927ce22e1c25a743de29816f6e6699e0562538f88fd14c.exe

  • Size

    619KB

  • MD5

    3c51ada1c25f215bfd75c6f670fde358

  • SHA1

    3ae6140843767be7ac1b44f1f3c5a8d09895b76a

  • SHA256

    afab9fcff33d4f9761927ce22e1c25a743de29816f6e6699e0562538f88fd14c

  • SHA512

    496b3de226025592c422d2e10c630a30167b19c593070617f94eb2fdb8346d1cfe31ffad08b5e76d8e51145e29520b81683a6a3d64b9aa89f687abed3690dfea

  • SSDEEP

    12288:vIcc9FzHDY4Lz6XYdv82Lc+jG6Ehwi3Mo5UjiuY+nuVidYnkeXY+N:e9FzujSG6ElVKJYxkeXY+N

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afab9fcff33d4f9761927ce22e1c25a743de29816f6e6699e0562538f88fd14c.exe
    "C:\Users\Admin\AppData\Local\Temp\afab9fcff33d4f9761927ce22e1c25a743de29816f6e6699e0562538f88fd14c.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Loads dropped DLL
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\n917\s917.exe
      "C:\Users\Admin\AppData\Local\Temp\n917\s917.exe" e85f6a03b4fffb1add55bb7604vmW84DWFjxYUC9HgOM0bzHfKJkYQg07a7g1Me5/RlphP4uhlMGLJpLk2Lb1m4km9LQKqLuiSBA0T1Y/zY/ioZ+75yQxMZ/pwduDDRe9+Hv328ri2y+aUhThI8b5b2ydD3IiF4nNittyW9J4AEbPqi/Z+LaxLfc32b7lUM= /v "C:\Users\Admin\AppData\Local\Temp\afab9fcff33d4f9761927ce22e1c25a743de29816f6e6699e0562538f88fd14c.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1380

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\n917\s917.exe

          Filesize

          350KB

          MD5

          54394ba7de5b2c5e3df92557ea95f014

          SHA1

          47a99735e089139495643c9027effcb6b1fc5504

          SHA256

          339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

          SHA512

          45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

        • C:\Users\Admin\AppData\Local\Temp\n917\s917.exe

          Filesize

          350KB

          MD5

          54394ba7de5b2c5e3df92557ea95f014

          SHA1

          47a99735e089139495643c9027effcb6b1fc5504

          SHA256

          339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

          SHA512

          45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

        • \Users\Admin\AppData\Local\Temp\n917\s917.exe

          Filesize

          350KB

          MD5

          54394ba7de5b2c5e3df92557ea95f014

          SHA1

          47a99735e089139495643c9027effcb6b1fc5504

          SHA256

          339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

          SHA512

          45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

        • \Users\Admin\AppData\Local\Temp\n917\s917.exe

          Filesize

          350KB

          MD5

          54394ba7de5b2c5e3df92557ea95f014

          SHA1

          47a99735e089139495643c9027effcb6b1fc5504

          SHA256

          339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

          SHA512

          45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

        • \Users\Admin\AppData\Local\Temp\n917\s917.exe

          Filesize

          350KB

          MD5

          54394ba7de5b2c5e3df92557ea95f014

          SHA1

          47a99735e089139495643c9027effcb6b1fc5504

          SHA256

          339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

          SHA512

          45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

        • \Users\Admin\AppData\Local\Temp\n917\s917.exe

          Filesize

          350KB

          MD5

          54394ba7de5b2c5e3df92557ea95f014

          SHA1

          47a99735e089139495643c9027effcb6b1fc5504

          SHA256

          339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

          SHA512

          45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

        • memory/756-54-0x0000000075ED1000-0x0000000075ED3000-memory.dmp

          Filesize

          8KB

        • memory/1380-62-0x000007FEF47A0000-0x000007FEF51C3000-memory.dmp

          Filesize

          10.1MB

        • memory/1380-63-0x000007FEF34C0000-0x000007FEF4556000-memory.dmp

          Filesize

          16.6MB

        • memory/1380-64-0x0000000002176000-0x0000000002195000-memory.dmp

          Filesize

          124KB

        • memory/1380-65-0x000007FEEE9D0000-0x000007FEEF85F000-memory.dmp

          Filesize

          14.6MB

        • memory/1380-66-0x000007FEF29E0000-0x000007FEF2CCA000-memory.dmp

          Filesize

          2.9MB

        • memory/1380-67-0x0000000002176000-0x0000000002195000-memory.dmp

          Filesize

          124KB

        • memory/1380-68-0x0000000002176000-0x0000000002195000-memory.dmp

          Filesize

          124KB