Analysis

  • max time kernel
    149s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 16:34

General

  • Target

    2992f676851f6952a2d320102af62a190efb24a9a9946c1f777f69f389e5afe1.exe

  • Size

    846KB

  • MD5

    7cfdc65f4feb349feb8e0024604e1313

  • SHA1

    0acf2ee8a5cfe9d6f1dec5a0aed15bee45746527

  • SHA256

    2992f676851f6952a2d320102af62a190efb24a9a9946c1f777f69f389e5afe1

  • SHA512

    34fa60c4625424658798c056a6a748d33f911895ef1fb4a743e0b9441afb27bb320e2cf38a0d9dac434b9d0eff0fccec5deebf38f1457593a6d708b7fe4ff90d

  • SSDEEP

    24576:yws5IlKswgKNn0bVPi8zPsPy2Hhc+2w2fMQdxN:ydIF+0bM8z0JHu9b/

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2992f676851f6952a2d320102af62a190efb24a9a9946c1f777f69f389e5afe1.exe
    "C:\Users\Admin\AppData\Local\Temp\2992f676851f6952a2d320102af62a190efb24a9a9946c1f777f69f389e5afe1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\ProgramData\isecurity.exe
      C:\ProgramData\isecurity.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Writes to the Master Boot Record (MBR)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\isecurity.exe

    Filesize

    838KB

    MD5

    995dbe80bc53454c1c4f07a6e08e7e10

    SHA1

    d28ccc826e54225efb69882c59787a3e6bbd32d0

    SHA256

    aaa766a6a3f9fd691f5e90fb7170e2e4db6eb44dc951d2a3650b21733e4457bb

    SHA512

    cd49bcc3944bbbfbb3b4a8b80736be7eca6363bafe7f1f6ff475f0d15b1603eef6bbbce9852eab118096909c491a4e617b1a309e9f4997ac2403dc03066064c2

  • \ProgramData\isecurity.exe

    Filesize

    838KB

    MD5

    995dbe80bc53454c1c4f07a6e08e7e10

    SHA1

    d28ccc826e54225efb69882c59787a3e6bbd32d0

    SHA256

    aaa766a6a3f9fd691f5e90fb7170e2e4db6eb44dc951d2a3650b21733e4457bb

    SHA512

    cd49bcc3944bbbfbb3b4a8b80736be7eca6363bafe7f1f6ff475f0d15b1603eef6bbbce9852eab118096909c491a4e617b1a309e9f4997ac2403dc03066064c2

  • \ProgramData\isecurity.exe

    Filesize

    838KB

    MD5

    995dbe80bc53454c1c4f07a6e08e7e10

    SHA1

    d28ccc826e54225efb69882c59787a3e6bbd32d0

    SHA256

    aaa766a6a3f9fd691f5e90fb7170e2e4db6eb44dc951d2a3650b21733e4457bb

    SHA512

    cd49bcc3944bbbfbb3b4a8b80736be7eca6363bafe7f1f6ff475f0d15b1603eef6bbbce9852eab118096909c491a4e617b1a309e9f4997ac2403dc03066064c2

  • \ProgramData\isecurity.exe

    Filesize

    838KB

    MD5

    995dbe80bc53454c1c4f07a6e08e7e10

    SHA1

    d28ccc826e54225efb69882c59787a3e6bbd32d0

    SHA256

    aaa766a6a3f9fd691f5e90fb7170e2e4db6eb44dc951d2a3650b21733e4457bb

    SHA512

    cd49bcc3944bbbfbb3b4a8b80736be7eca6363bafe7f1f6ff475f0d15b1603eef6bbbce9852eab118096909c491a4e617b1a309e9f4997ac2403dc03066064c2

  • memory/620-54-0x0000000075711000-0x0000000075713000-memory.dmp

    Filesize

    8KB

  • memory/620-55-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB

  • memory/760-59-0x0000000000000000-mapping.dmp

  • memory/760-62-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/760-64-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/760-65-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB