Analysis

  • max time kernel
    84s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 14:22

General

  • Target

    ca3ccbe9e59ce6bf599e44a0c621251ce4366c2f99619460d9f662f6a8816cae.exe

  • Size

    240KB

  • MD5

    44b7738da37d52d3aa5c47a6c8af8ca4

  • SHA1

    cdd4dfe566d30b3096544bf567ddfb369a4e96a4

  • SHA256

    ca3ccbe9e59ce6bf599e44a0c621251ce4366c2f99619460d9f662f6a8816cae

  • SHA512

    b5b08de0c27be4829a1a6a076848be323a23815bba89f29a635e3af305e19776539f1e084df9c1812e12cdd73c87254468686c95a2e30077e27fff6aa412db77

  • SSDEEP

    6144:TAQnIaoYDf3X35QpVv6MJ2bG2OefnRA31pyqW:dD/pQ7v6MADayr

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca3ccbe9e59ce6bf599e44a0c621251ce4366c2f99619460d9f662f6a8816cae.exe
    "C:\Users\Admin\AppData\Local\Temp\ca3ccbe9e59ce6bf599e44a0c621251ce4366c2f99619460d9f662f6a8816cae.exe"
    1⤵
    • Loads dropped DLL
    PID:1456

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\nsj1FD3.tmp\inetc.dll

          Filesize

          25KB

          MD5

          29e2dcdfb57ee3ab5e2bbc2fc3c42f02

          SHA1

          bd6cafcce5b70ee15311f9f53e9fd4aac819ccda

          SHA256

          2b7a69e98ed4975fd4eade513cff17099c43b3eebe7e7641696d1d20e8e14b2f

          SHA512

          f71c981b3b5308566b56156462d106ebf8e49a32e55b70891f9d70338941afd347cb4df374fe38b9b3d7309f63dd75a7c80ebe02bb8941d558cd638a6f8daf7a

        • \Users\Admin\AppData\Local\Temp\nsj1FD3.tmp\inetc.dll

          Filesize

          25KB

          MD5

          29e2dcdfb57ee3ab5e2bbc2fc3c42f02

          SHA1

          bd6cafcce5b70ee15311f9f53e9fd4aac819ccda

          SHA256

          2b7a69e98ed4975fd4eade513cff17099c43b3eebe7e7641696d1d20e8e14b2f

          SHA512

          f71c981b3b5308566b56156462d106ebf8e49a32e55b70891f9d70338941afd347cb4df374fe38b9b3d7309f63dd75a7c80ebe02bb8941d558cd638a6f8daf7a

        • \Users\Admin\AppData\Local\Temp\nsj1FD3.tmp\nsDialogs.dll

          Filesize

          11KB

          MD5

          66cfc94903c8cfa492fdab42bde2026d

          SHA1

          d07194419d914eae5dc54a480ebddb0a8cb32f25

          SHA256

          82e21860521feea4d15ff7f30538b9d0ed1860747c98549ec85217178a6db632

          SHA512

          ecbc2c9361bef9332fe8e1675d11884c344b26f437eee9db3ec0b5999bf20e16b1d863c192e2091375a870cf8f4674deec16875ba56757b88cc859288305eeb7

        • \Users\Admin\AppData\Local\Temp\nsj1FD3.tmp\nsJSON.dll

          Filesize

          7KB

          MD5

          b9cd1b0fd3af89892348e5cc3108dce7

          SHA1

          f7bc59bf631303facfc970c0da67a73568e1dca6

          SHA256

          49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

          SHA512

          fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

        • \Users\Admin\AppData\Local\Temp\nsj1FD3.tmp\nsRichEdit.dll

          Filesize

          5KB

          MD5

          02f1858b3131ffc3fc5e3a5391d3a489

          SHA1

          454a6d749cf55ff990bd9f57941aca9d1f1674f6

          SHA256

          f00bd6d3e7c7b8e8ad18b7dc6275fb80cc720fb164200a6506f50f6e66998b12

          SHA512

          8147fa8014a5065f4fed7de1fbb9c2ee2c1b94d63596f7bbcf6821ecd41a73d25ebdfa1e71ca74d7598cba063042b6dfcaf050a23d0c855a7b6fbc94147ab41b

        • memory/1456-54-0x00000000766F1000-0x00000000766F3000-memory.dmp

          Filesize

          8KB

        • memory/1456-58-0x00000000752E0000-0x00000000752EA000-memory.dmp

          Filesize

          40KB

        • memory/1456-59-0x0000000075200000-0x0000000075209000-memory.dmp

          Filesize

          36KB