Analysis

  • max time kernel
    63s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 11:04

General

  • Target

    ed4b61b0ea2f4b11b981f0f58b034fb4135ed4c07a5609cd51cef01e52c4be9f.exe

  • Size

    618KB

  • MD5

    0b61e24bd23ff9fa9ecb4126240dc95c

  • SHA1

    a950562cb377c3046ec2a78ac4a502f3f763f427

  • SHA256

    ed4b61b0ea2f4b11b981f0f58b034fb4135ed4c07a5609cd51cef01e52c4be9f

  • SHA512

    0f57103306bb883d0ff1cfb2da748e41f9cb89208ae10c3f2a25b3ecc1886b1303dc3b477500253882c3c787da2851a06f8f94e416f9ecc5f25c90ebfb8a25e3

  • SSDEEP

    12288:yKfC2/WC5btCQFxZITbejP27e73Rrx8FkWIGoC3tXkg/DKWO4g8CXdpYiY+F:K2/W0NDZ/b6uumGpdXkg/DKWOj8C8iYe

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed4b61b0ea2f4b11b981f0f58b034fb4135ed4c07a5609cd51cef01e52c4be9f.exe
    "C:\Users\Admin\AppData\Local\Temp\ed4b61b0ea2f4b11b981f0f58b034fb4135ed4c07a5609cd51cef01e52c4be9f.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Loads dropped DLL
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\n8186\s8186.exe
      "C:\Users\Admin\AppData\Local\Temp\n8186\s8186.exe" 6cbbb58b9fe71e2083910c61W0SHN9v2GFmcaWAX84co8EuAe9apXi1khiZJlmrJ8CScHngP4vI0sBt8g3T6WS4iPQH03C1IFZUxkNuNiQE90+Sag9kYIAOmoR0Foe/Qw76Y8fnZ5BRzfRgFZasu6ehQ/zImdqSdjuHYHb4FTxS5IxXtdbpD8M+jz4lze2k= /v "C:\Users\Admin\AppData\Local\Temp\ed4b61b0ea2f4b11b981f0f58b034fb4135ed4c07a5609cd51cef01e52c4be9f.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n8186\s8186.exe

    Filesize

    350KB

    MD5

    54394ba7de5b2c5e3df92557ea95f014

    SHA1

    47a99735e089139495643c9027effcb6b1fc5504

    SHA256

    339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

    SHA512

    45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

  • C:\Users\Admin\AppData\Local\Temp\n8186\s8186.exe

    Filesize

    350KB

    MD5

    54394ba7de5b2c5e3df92557ea95f014

    SHA1

    47a99735e089139495643c9027effcb6b1fc5504

    SHA256

    339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

    SHA512

    45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

  • \Users\Admin\AppData\Local\Temp\n8186\s8186.exe

    Filesize

    350KB

    MD5

    54394ba7de5b2c5e3df92557ea95f014

    SHA1

    47a99735e089139495643c9027effcb6b1fc5504

    SHA256

    339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

    SHA512

    45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

  • \Users\Admin\AppData\Local\Temp\n8186\s8186.exe

    Filesize

    350KB

    MD5

    54394ba7de5b2c5e3df92557ea95f014

    SHA1

    47a99735e089139495643c9027effcb6b1fc5504

    SHA256

    339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

    SHA512

    45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

  • \Users\Admin\AppData\Local\Temp\n8186\s8186.exe

    Filesize

    350KB

    MD5

    54394ba7de5b2c5e3df92557ea95f014

    SHA1

    47a99735e089139495643c9027effcb6b1fc5504

    SHA256

    339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

    SHA512

    45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

  • \Users\Admin\AppData\Local\Temp\n8186\s8186.exe

    Filesize

    350KB

    MD5

    54394ba7de5b2c5e3df92557ea95f014

    SHA1

    47a99735e089139495643c9027effcb6b1fc5504

    SHA256

    339f7dd54a1e07bfcabb5749047ef4ab615462213f5baaa62fb690c894bef1eb

    SHA512

    45928ffec4f1bf9a86469bb54f83ba6fdcd275ef9826bd923e890fce83d7a8f975c309bda4849d3f2d066ea458f23fa8e6aefe26be5e874249712462ecd69660

  • memory/1256-54-0x0000000075C61000-0x0000000075C63000-memory.dmp

    Filesize

    8KB

  • memory/1984-62-0x000007FEF3250000-0x000007FEF3C73000-memory.dmp

    Filesize

    10.1MB

  • memory/1984-63-0x000007FEF1AD0000-0x000007FEF2B66000-memory.dmp

    Filesize

    16.6MB

  • memory/1984-64-0x0000000000BC6000-0x0000000000BE5000-memory.dmp

    Filesize

    124KB

  • memory/1984-65-0x0000000000BC6000-0x0000000000BE5000-memory.dmp

    Filesize

    124KB

  • memory/1984-66-0x000007FEED800000-0x000007FEEE68F000-memory.dmp

    Filesize

    14.6MB

  • memory/1984-67-0x000007FEF2F60000-0x000007FEF324A000-memory.dmp

    Filesize

    2.9MB

  • memory/1984-68-0x0000000000BC6000-0x0000000000BE5000-memory.dmp

    Filesize

    124KB