Analysis

  • max time kernel
    145s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 19:04

General

  • Target

    2765f7ea0956bac0d64bd9799705f601e6fd42770294354ea4b74a6998137b61.exe

  • Size

    206KB

  • MD5

    44992c27cd09dc998b239e3dae7095f6

  • SHA1

    f8111075dc7fac6c4b7997438943fe6078a72147

  • SHA256

    2765f7ea0956bac0d64bd9799705f601e6fd42770294354ea4b74a6998137b61

  • SHA512

    92c3f96a2c9e361012deee0d698941009484c52d081218352b92dad1d981f6ea77c9fcff104f394d1bc167ca3b6ef6be460771fe2c153e5a82dc409edbc12d78

  • SSDEEP

    3072:lmR3i6zP2xc9SfRH/Qin/jzO5tP0/0S9Db31kvSGv6gG2nAwDtV:lmQ6yxc9SF4l52jnlN06jIbT

Malware Config

Signatures

  • CryptOne packer 7 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2765f7ea0956bac0d64bd9799705f601e6fd42770294354ea4b74a6998137b61.exe
    "C:\Users\Admin\AppData\Local\Temp\2765f7ea0956bac0d64bd9799705f601e6fd42770294354ea4b74a6998137b61.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Adds Run key to start application
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\SysWOW64\notepad.exe"
        3⤵
        • Deletes itself
        • Adds Run key to start application
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:1376
    • C:\Windows\SysWOW64\calc.exe
      "C:\Windows\SysWOW64\calc.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1708
    • C:\Users\Admin\AppData\Local\Temp\2765f7ea0956bac0d64bd9799705f601e6fd42770294354ea4b74a6998137b61.exe
      "C:\Users\Admin\AppData\Local\Temp\2765f7ea0956bac0d64bd9799705f601e6fd42770294354ea4b74a6998137b61.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1092

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1092-76-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/1092-114-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/1092-91-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/1092-89-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/1092-86-0x0000000000410910-mapping.dmp
  • memory/1092-85-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/1092-83-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/1092-81-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/1092-79-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/1092-77-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/1376-73-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/1376-325-0x00000000001A0000-0x00000000001EE000-memory.dmp
    Filesize

    312KB

  • memory/1376-72-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/1376-75-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/1376-74-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/1376-70-0x0000000000000000-mapping.dmp
  • memory/1376-128-0x00000000001A0000-0x00000000001EE000-memory.dmp
    Filesize

    312KB

  • memory/1376-90-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/1376-110-0x00000000001A0000-0x00000000001EE000-memory.dmp
    Filesize

    312KB

  • memory/1376-117-0x00000000001A0000-0x00000000001EE000-memory.dmp
    Filesize

    312KB

  • memory/1612-62-0x0000000000400000-0x00000000039B9000-memory.dmp
    Filesize

    53.7MB

  • memory/1612-54-0x0000000076681000-0x0000000076683000-memory.dmp
    Filesize

    8KB

  • memory/1612-55-0x0000000000260000-0x0000000000264000-memory.dmp
    Filesize

    16KB

  • memory/1612-92-0x0000000000400000-0x00000000039B9000-memory.dmp
    Filesize

    53.7MB

  • memory/1612-56-0x0000000000270000-0x0000000000289000-memory.dmp
    Filesize

    100KB

  • memory/1708-67-0x0000000000080000-0x0000000000082000-memory.dmp
    Filesize

    8KB

  • memory/1708-58-0x0000000000080000-0x0000000000082000-memory.dmp
    Filesize

    8KB

  • memory/1708-107-0x00000000002B0000-0x00000000002FE000-memory.dmp
    Filesize

    312KB

  • memory/1708-116-0x00000000002B0000-0x00000000002FE000-memory.dmp
    Filesize

    312KB

  • memory/1708-102-0x00000000002B0000-0x00000000002FE000-memory.dmp
    Filesize

    312KB

  • memory/1708-324-0x00000000002B0000-0x00000000002FE000-memory.dmp
    Filesize

    312KB

  • memory/1708-63-0x0000000000000000-mapping.dmp
  • memory/1708-123-0x00000000002B0000-0x00000000002FE000-memory.dmp
    Filesize

    312KB

  • memory/1952-98-0x0000000000260000-0x00000000002AE000-memory.dmp
    Filesize

    312KB

  • memory/1952-131-0x0000000000260000-0x00000000002AE000-memory.dmp
    Filesize

    312KB

  • memory/1952-127-0x0000000000260000-0x00000000002AE000-memory.dmp
    Filesize

    312KB

  • memory/1952-124-0x0000000000260000-0x00000000002AE000-memory.dmp
    Filesize

    312KB

  • memory/1952-120-0x0000000000260000-0x00000000002AE000-memory.dmp
    Filesize

    312KB

  • memory/1952-109-0x0000000000260000-0x00000000002AE000-memory.dmp
    Filesize

    312KB

  • memory/1952-103-0x0000000000260000-0x00000000002AE000-memory.dmp
    Filesize

    312KB

  • memory/1952-115-0x0000000000260000-0x00000000002AE000-memory.dmp
    Filesize

    312KB

  • memory/1952-93-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/1952-57-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/1952-323-0x0000000000260000-0x00000000002AE000-memory.dmp
    Filesize

    312KB

  • memory/1952-61-0x0000000000000000-mapping.dmp
  • memory/1952-66-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB