Analysis

  • max time kernel
    178s
  • max time network
    260s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 00:48

General

  • Target

    ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe

  • Size

    193KB

  • MD5

    81893f62cfc3a6d923bc64897f4475a1

  • SHA1

    83163c7d4f746f809dab7f4ff7c3019c4b32520a

  • SHA256

    ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac

  • SHA512

    dd7f06ece14cf231da28a50516e105419a055f7c2f1783589a5c0f2fe87fa996a812ae03aade89976a64148cf93145396f39a29f93fb0a5d4c277827e1f931ea

  • SSDEEP

    3072:lX7DItrfaocyTgfsqQOlJqyCM+d81eVr6h+37qHxsde+OeSyqJ1n0C:lsaocyLCqLRdUGrW+LqHkq10C

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe
    "C:\Users\Admin\AppData\Local\Temp\ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Users\Admin\AppData\Local\Temp\nsj786D.tmp\installer.exe
      C:\Users\Admin\AppData\Local\Temp\nsj786D.tmp\installer.exe 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe /dT131381424S /e6030842 /t /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Users\Admin\AppData\Local\Temp\nsj786D.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe
        "C:\Users\Admin\AppData\Local\Temp\nsj786D.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe" /dT131381424S /e6030842 /t /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30

    Filesize

    1KB

    MD5

    7339ea35afc5fa0a61af3b9515365bfd

    SHA1

    347ca8ac22f1f5f4b631e04fe8381f1d45df570a

    SHA256

    81d049b342ae2f1d188bd7bbd227eab7b39415f234d231c653158ffa1f0be60d

    SHA512

    fe7216159a026deef2eb9dd2185c2373828bc49fade836d5d37494e6aed70960b9c88e40e6d427a4a04f07576390092883c70c16c4385971ae81a0b9ffdbfb39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    604B

    MD5

    e7ed9b0571e14a4824cebee137d9bcd1

    SHA1

    59d9a27a741aee4bfc0605a287a88782cdafe6ff

    SHA256

    62f9b298a1f9e62f29c486f9cd2731a28302b9215656fd8b1c7c0071071b25ad

    SHA512

    6f6f379a5fbce3afbfb29b159bfe784ecf4b42672c5bc441e89383c54ccd210766388526748c48f9889cfdd5e126054a8d67971d69c46f37bb117e515ad9d400

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30

    Filesize

    412B

    MD5

    c1297aafa3a7ac89bf6ad5d34d71c38f

    SHA1

    a9b56875c101cddd9c892ba6d92db63c1ba7a6a2

    SHA256

    913eecc2df4fb9e78796964227dc97df5ed26c9fcee0a6917baa2d35b8425720

    SHA512

    a8a860da86905b3ed795d616cc401e1df6e884ff3600dd1a82a11f581ba0188fb618c1a686ae5a4c7828f7f2d80ad41efd8e9d46d5f9d38c8b83317c43d75ae5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    188B

    MD5

    decee8f1864fc4ce1f113f4904e78876

    SHA1

    6c0a0868c36b9face37791ae7a4c05edc1d88254

    SHA256

    fe986b665b7d4d2b27b19b16adff8c64f0f1c7cb4c2009fe6066172883f3761a

    SHA512

    9248991f180670c51f984693a9bae8f57db9ca5f55eadf2237f786042655dad697161d1c973263854d3e95cc62838b3658905b8be0a3b1ff4dd4df7b92fce2e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3b96046165aa8dc089a862ae003ee32

    SHA1

    87a0135f7136bc722f001c021688f7a5d224bf5b

    SHA256

    1db54fc4f98806089be8ffa76d7a12672c8812fffe80e87a8204bea414586238

    SHA512

    ec815c81d5732dec3f9f392d5d12652facf754b333d4954fc0887b8720159afbe1ddff104aa5fb2ebcbefac4c8af1182e0309d407bc7cb203c6a19a37a18dded

  • C:\Users\Admin\AppData\Local\Temp\nsj786D.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe

    Filesize

    151KB

    MD5

    17fcf5c9b33b94d76600fff3e4a230aa

    SHA1

    9279d85e8a737cf8187696b7190384997c437408

    SHA256

    0e0a783e665b5f2aa7a732100b4a8024ee787c552bc89111eb933638a5d37c59

    SHA512

    1502d7c84cc5a1eaa46dcd271b05bdc064663044291ce195ce87df0265261cfcf4dbf4f9779ae1e9b9d5fb4e04313b4b6644c1cbe0f8dcd523a52479e6d0bbe7

  • C:\Users\Admin\AppData\Local\Temp\nsj786D.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe

    Filesize

    151KB

    MD5

    17fcf5c9b33b94d76600fff3e4a230aa

    SHA1

    9279d85e8a737cf8187696b7190384997c437408

    SHA256

    0e0a783e665b5f2aa7a732100b4a8024ee787c552bc89111eb933638a5d37c59

    SHA512

    1502d7c84cc5a1eaa46dcd271b05bdc064663044291ce195ce87df0265261cfcf4dbf4f9779ae1e9b9d5fb4e04313b4b6644c1cbe0f8dcd523a52479e6d0bbe7

  • C:\Users\Admin\AppData\Local\Temp\nsj786D.tmp\installer.exe

    Filesize

    139KB

    MD5

    0b8564345ce0ff65f6e22f10b8bbc2be

    SHA1

    badecaf253c1e9e6db0327fa4ea0237446e51cf7

    SHA256

    de113de702b145bf9ac16ec8db83e779d631093f13867cbfe42f05411be5b353

    SHA512

    028e839be6085444066db576edb2eb4e8b0e5e70971fb54e60a2c62ad34427244765f4099f0b4134fd2c477a7e3eede2d08b465a6ee7d203377d7cff546ee02f

  • C:\Users\Admin\AppData\Local\Temp\nsj786D.tmp\installer.exe

    Filesize

    139KB

    MD5

    0b8564345ce0ff65f6e22f10b8bbc2be

    SHA1

    badecaf253c1e9e6db0327fa4ea0237446e51cf7

    SHA256

    de113de702b145bf9ac16ec8db83e779d631093f13867cbfe42f05411be5b353

    SHA512

    028e839be6085444066db576edb2eb4e8b0e5e70971fb54e60a2c62ad34427244765f4099f0b4134fd2c477a7e3eede2d08b465a6ee7d203377d7cff546ee02f

  • \Users\Admin\AppData\Local\Temp\nsj786D.tmp\installer.exe

    Filesize

    139KB

    MD5

    0b8564345ce0ff65f6e22f10b8bbc2be

    SHA1

    badecaf253c1e9e6db0327fa4ea0237446e51cf7

    SHA256

    de113de702b145bf9ac16ec8db83e779d631093f13867cbfe42f05411be5b353

    SHA512

    028e839be6085444066db576edb2eb4e8b0e5e70971fb54e60a2c62ad34427244765f4099f0b4134fd2c477a7e3eede2d08b465a6ee7d203377d7cff546ee02f

  • \Users\Admin\AppData\Local\Temp\nsj786D.tmp\installer.exe

    Filesize

    139KB

    MD5

    0b8564345ce0ff65f6e22f10b8bbc2be

    SHA1

    badecaf253c1e9e6db0327fa4ea0237446e51cf7

    SHA256

    de113de702b145bf9ac16ec8db83e779d631093f13867cbfe42f05411be5b353

    SHA512

    028e839be6085444066db576edb2eb4e8b0e5e70971fb54e60a2c62ad34427244765f4099f0b4134fd2c477a7e3eede2d08b465a6ee7d203377d7cff546ee02f

  • \Users\Admin\AppData\Local\Temp\nsj786D.tmp\nsExec.dll

    Filesize

    8KB

    MD5

    249ae678f0dac4c625c6de6aca53823a

    SHA1

    6ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201

    SHA256

    7298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce

    SHA512

    66e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7

  • memory/568-54-0x0000000075491000-0x0000000075493000-memory.dmp

    Filesize

    8KB

  • memory/1508-58-0x0000000000000000-mapping.dmp

  • memory/1508-65-0x0000000000AD6000-0x0000000000AF5000-memory.dmp

    Filesize

    124KB

  • memory/1508-62-0x000007FEFBDD1000-0x000007FEFBDD3000-memory.dmp

    Filesize

    8KB

  • memory/1508-61-0x000007FEF3940000-0x000007FEF4363000-memory.dmp

    Filesize

    10.1MB

  • memory/1704-63-0x0000000000000000-mapping.dmp

  • memory/1704-73-0x00000000743B0000-0x000000007495B000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-74-0x00000000743B0000-0x000000007495B000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-75-0x00000000020B9000-0x00000000020CA000-memory.dmp

    Filesize

    68KB

  • memory/1704-76-0x00000000743B0000-0x000000007495B000-memory.dmp

    Filesize

    5.7MB