Analysis

  • max time kernel
    152s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 15:10

General

  • Target

    b7250785bbcb7676b32f4d0dbca4bfb1ed4e0f84ad28a2bbac10b4c695cb5f48.exe

  • Size

    809KB

  • MD5

    9fa89d305d099f16e1fc13048efa6e98

  • SHA1

    3dca0f3ffe53c3a90d33d10ee9656407587b625f

  • SHA256

    b7250785bbcb7676b32f4d0dbca4bfb1ed4e0f84ad28a2bbac10b4c695cb5f48

  • SHA512

    5a7493cc56b634fea0d82c6cdaa0d88d51a77aa850e99a9494043df2bc06dfe55ab57913e038b1ad04330ec94aa1cae86dc412d504bec38c57f849a6c9527760

  • SSDEEP

    24576:n2Qoqtcz49Sznsb9q0wK6e9D08IxDL+dznt9103yv:lb849UnsJvzJnOnizntU3

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SendNotifyMessage 11 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7250785bbcb7676b32f4d0dbca4bfb1ed4e0f84ad28a2bbac10b4c695cb5f48.exe
    "C:\Users\Admin\AppData\Local\Temp\b7250785bbcb7676b32f4d0dbca4bfb1ed4e0f84ad28a2bbac10b4c695cb5f48.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\ProgramData\privacy.exe
      C:\ProgramData\privacy.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Writes to the Master Boot Record (MBR)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\privacy.exe

    Filesize

    797KB

    MD5

    66efb21472b33a6229616869ad5f0724

    SHA1

    f7e64181a7ddccfc599952032a6b40e02e8e8681

    SHA256

    b64f7e0037e944e34a5b665ed3b3d4a64371f65a77ec0d2a9b007528cfd2cc1a

    SHA512

    1bdf5ac3e23027fdb0fdd7140accf36f12bfb99b7f08881aa29882ea00255255ce3aef450041a9e95d30513e8bf30895b99bfccbbf78923054dd2e5cd043d50d

  • \ProgramData\privacy.exe

    Filesize

    797KB

    MD5

    66efb21472b33a6229616869ad5f0724

    SHA1

    f7e64181a7ddccfc599952032a6b40e02e8e8681

    SHA256

    b64f7e0037e944e34a5b665ed3b3d4a64371f65a77ec0d2a9b007528cfd2cc1a

    SHA512

    1bdf5ac3e23027fdb0fdd7140accf36f12bfb99b7f08881aa29882ea00255255ce3aef450041a9e95d30513e8bf30895b99bfccbbf78923054dd2e5cd043d50d

  • \ProgramData\privacy.exe

    Filesize

    797KB

    MD5

    66efb21472b33a6229616869ad5f0724

    SHA1

    f7e64181a7ddccfc599952032a6b40e02e8e8681

    SHA256

    b64f7e0037e944e34a5b665ed3b3d4a64371f65a77ec0d2a9b007528cfd2cc1a

    SHA512

    1bdf5ac3e23027fdb0fdd7140accf36f12bfb99b7f08881aa29882ea00255255ce3aef450041a9e95d30513e8bf30895b99bfccbbf78923054dd2e5cd043d50d

  • \ProgramData\privacy.exe

    Filesize

    797KB

    MD5

    66efb21472b33a6229616869ad5f0724

    SHA1

    f7e64181a7ddccfc599952032a6b40e02e8e8681

    SHA256

    b64f7e0037e944e34a5b665ed3b3d4a64371f65a77ec0d2a9b007528cfd2cc1a

    SHA512

    1bdf5ac3e23027fdb0fdd7140accf36f12bfb99b7f08881aa29882ea00255255ce3aef450041a9e95d30513e8bf30895b99bfccbbf78923054dd2e5cd043d50d

  • memory/960-56-0x0000000002400000-0x0000000002500000-memory.dmp

    Filesize

    1024KB

  • memory/960-54-0x00000000753D1000-0x00000000753D3000-memory.dmp

    Filesize

    8KB

  • memory/960-55-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/960-67-0x0000000002400000-0x0000000002500000-memory.dmp

    Filesize

    1024KB

  • memory/1528-63-0x0000000000400000-0x0000000000B0A000-memory.dmp

    Filesize

    7.0MB

  • memory/1528-65-0x0000000000220000-0x00000000002C0000-memory.dmp

    Filesize

    640KB

  • memory/1528-66-0x0000000000400000-0x0000000000B0A000-memory.dmp

    Filesize

    7.0MB

  • memory/1528-68-0x0000000000400000-0x0000000000B0A000-memory.dmp

    Filesize

    7.0MB