Analysis

  • max time kernel
    217s
  • max time network
    279s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 14:12

General

  • Target

    b3e6df47cba8197b56adf3c6e8584090b8d35402015a57a15905588c6d09ebce.exe

  • Size

    164KB

  • MD5

    af91fd38655cd537653cc35669cfc117

  • SHA1

    4838ffb739a4f8041f71e957f3d9422d4ba4ec19

  • SHA256

    b3e6df47cba8197b56adf3c6e8584090b8d35402015a57a15905588c6d09ebce

  • SHA512

    ce3b10049b038b69399795bfa7c2ee95a0a3e3149856a614eb69281e16321dd6f11def2def20dd6f4b506f884e16137ed3fd9ea14c75973a325fd8212840390f

  • SSDEEP

    3072:b1dlKwgj23+Oz05YoNoz9hsUQMvccO+wm8wk5hJv04NvkPtcep:b1dlZro5y9FvccOUUTEt

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3e6df47cba8197b56adf3c6e8584090b8d35402015a57a15905588c6d09ebce.exe
    "C:\Users\Admin\AppData\Local\Temp\b3e6df47cba8197b56adf3c6e8584090b8d35402015a57a15905588c6d09ebce.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Extracted\1.exe
      "C:\Extracted\1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Users\Admin\AppData\Local\Temp\server.exe
        "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1860
        • C:\Windows\system32\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Extracted\1.exe

    Filesize

    139KB

    MD5

    8b0fc3a9f77771308cae8c369846b8ea

    SHA1

    a751a8ee54c106216aff82a8ab8e9f4bb423cf3b

    SHA256

    0227dd5375f9d31236a52b8d6e2c09272f71fbe523aeb4a4a8a01abebd1d819f

    SHA512

    5ef58964e66cce5c5b40c89b7a8f99c78ea44d7aea502f85985f42400ed13cd11d33cf0d9cc0348a9ac428a4d06297964b87225451cfe505578338408027c6c8

  • C:\Extracted\1.exe

    Filesize

    139KB

    MD5

    8b0fc3a9f77771308cae8c369846b8ea

    SHA1

    a751a8ee54c106216aff82a8ab8e9f4bb423cf3b

    SHA256

    0227dd5375f9d31236a52b8d6e2c09272f71fbe523aeb4a4a8a01abebd1d819f

    SHA512

    5ef58964e66cce5c5b40c89b7a8f99c78ea44d7aea502f85985f42400ed13cd11d33cf0d9cc0348a9ac428a4d06297964b87225451cfe505578338408027c6c8

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    139KB

    MD5

    8b0fc3a9f77771308cae8c369846b8ea

    SHA1

    a751a8ee54c106216aff82a8ab8e9f4bb423cf3b

    SHA256

    0227dd5375f9d31236a52b8d6e2c09272f71fbe523aeb4a4a8a01abebd1d819f

    SHA512

    5ef58964e66cce5c5b40c89b7a8f99c78ea44d7aea502f85985f42400ed13cd11d33cf0d9cc0348a9ac428a4d06297964b87225451cfe505578338408027c6c8

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    139KB

    MD5

    8b0fc3a9f77771308cae8c369846b8ea

    SHA1

    a751a8ee54c106216aff82a8ab8e9f4bb423cf3b

    SHA256

    0227dd5375f9d31236a52b8d6e2c09272f71fbe523aeb4a4a8a01abebd1d819f

    SHA512

    5ef58964e66cce5c5b40c89b7a8f99c78ea44d7aea502f85985f42400ed13cd11d33cf0d9cc0348a9ac428a4d06297964b87225451cfe505578338408027c6c8

  • \Extracted\1.exe

    Filesize

    139KB

    MD5

    8b0fc3a9f77771308cae8c369846b8ea

    SHA1

    a751a8ee54c106216aff82a8ab8e9f4bb423cf3b

    SHA256

    0227dd5375f9d31236a52b8d6e2c09272f71fbe523aeb4a4a8a01abebd1d819f

    SHA512

    5ef58964e66cce5c5b40c89b7a8f99c78ea44d7aea502f85985f42400ed13cd11d33cf0d9cc0348a9ac428a4d06297964b87225451cfe505578338408027c6c8

  • memory/564-60-0x000007FEF2770000-0x000007FEF3806000-memory.dmp

    Filesize

    16.6MB

  • memory/564-61-0x000007FEFBBC1000-0x000007FEFBBC3000-memory.dmp

    Filesize

    8KB

  • memory/564-59-0x000007FEF3C60000-0x000007FEF4683000-memory.dmp

    Filesize

    10.1MB

  • memory/1860-65-0x000007FEF49B0000-0x000007FEF53D3000-memory.dmp

    Filesize

    10.1MB

  • memory/1860-66-0x000007FEF2710000-0x000007FEF37A6000-memory.dmp

    Filesize

    16.6MB

  • memory/1944-54-0x0000000075D11000-0x0000000075D13000-memory.dmp

    Filesize

    8KB