Analysis

  • max time kernel
    152s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 00:16

General

  • Target

    1c5354044cae2fb8763cad464e3b2fd2a4ee04ff4668d01dee2bf2442d204a75.exe

  • Size

    512KB

  • MD5

    3f227c81d6c303835a02e7aae67f1048

  • SHA1

    424f32a3ac3b80eddb1f049501817a1ef5daba9d

  • SHA256

    1c5354044cae2fb8763cad464e3b2fd2a4ee04ff4668d01dee2bf2442d204a75

  • SHA512

    107972f6cfd5e16cd30581ab61662115414cf82aec0270aa4c8aec95a834d03b0be7f2f25f7fb2be9ae8e1a3da3699148b5fca426b362d99f327770777336b99

  • SSDEEP

    12288:0+h9St2Ma70zIIc91Dwws4zruXic2O/3E4Q:0+h9OY70z+warul3E4Q

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c5354044cae2fb8763cad464e3b2fd2a4ee04ff4668d01dee2bf2442d204a75.exe
    "C:\Users\Admin\AppData\Local\Temp\1c5354044cae2fb8763cad464e3b2fd2a4ee04ff4668d01dee2bf2442d204a75.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Loads dropped DLL
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Users\Admin\AppData\Local\Temp\n5229\s5229.exe
      "C:\Users\Admin\AppData\Local\Temp\n5229\s5229.exe" 60f0820f74df350395cd3e82rkd/nhWOONbW8J8asSL3CW9U1SlJl9xOr5GctPZ87eUDJzIBqvjMVDww8Y5efvDif2v8v78X/P5nGcPtQHd19bFXAbHGYPbpfa+tJEp8zf/aVLi7tO+n3WchzawhKuaPIpTTsQmNBzxLRntnjSKPImqp /v "C:\Users\Admin\AppData\Local\Temp\1c5354044cae2fb8763cad464e3b2fd2a4ee04ff4668d01dee2bf2442d204a75.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1936

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\n5229\s5229.exe

          Filesize

          230KB

          MD5

          abaf13cb23de482dc944ab5b51ca3aac

          SHA1

          76837356db96dd56b647aba60f1adbbdc7b200fe

          SHA256

          b02fad5ac5234401505e1682c86f526951e8ded726687088c30987321f7c105e

          SHA512

          cc2aac30490511e49e1268f5df9139d176a3b849e663ad3b739e2f1cb50a6e084c465772ded5f694d5ec6f19ac40a57e5e64f7c47515f212476c20cbe9d6bce3

        • C:\Users\Admin\AppData\Local\Temp\n5229\s5229.exe

          Filesize

          230KB

          MD5

          abaf13cb23de482dc944ab5b51ca3aac

          SHA1

          76837356db96dd56b647aba60f1adbbdc7b200fe

          SHA256

          b02fad5ac5234401505e1682c86f526951e8ded726687088c30987321f7c105e

          SHA512

          cc2aac30490511e49e1268f5df9139d176a3b849e663ad3b739e2f1cb50a6e084c465772ded5f694d5ec6f19ac40a57e5e64f7c47515f212476c20cbe9d6bce3

        • \Users\Admin\AppData\Local\Temp\n5229\s5229.exe

          Filesize

          230KB

          MD5

          abaf13cb23de482dc944ab5b51ca3aac

          SHA1

          76837356db96dd56b647aba60f1adbbdc7b200fe

          SHA256

          b02fad5ac5234401505e1682c86f526951e8ded726687088c30987321f7c105e

          SHA512

          cc2aac30490511e49e1268f5df9139d176a3b849e663ad3b739e2f1cb50a6e084c465772ded5f694d5ec6f19ac40a57e5e64f7c47515f212476c20cbe9d6bce3

        • \Users\Admin\AppData\Local\Temp\n5229\s5229.exe

          Filesize

          230KB

          MD5

          abaf13cb23de482dc944ab5b51ca3aac

          SHA1

          76837356db96dd56b647aba60f1adbbdc7b200fe

          SHA256

          b02fad5ac5234401505e1682c86f526951e8ded726687088c30987321f7c105e

          SHA512

          cc2aac30490511e49e1268f5df9139d176a3b849e663ad3b739e2f1cb50a6e084c465772ded5f694d5ec6f19ac40a57e5e64f7c47515f212476c20cbe9d6bce3

        • \Users\Admin\AppData\Local\Temp\n5229\s5229.exe

          Filesize

          230KB

          MD5

          abaf13cb23de482dc944ab5b51ca3aac

          SHA1

          76837356db96dd56b647aba60f1adbbdc7b200fe

          SHA256

          b02fad5ac5234401505e1682c86f526951e8ded726687088c30987321f7c105e

          SHA512

          cc2aac30490511e49e1268f5df9139d176a3b849e663ad3b739e2f1cb50a6e084c465772ded5f694d5ec6f19ac40a57e5e64f7c47515f212476c20cbe9d6bce3

        • \Users\Admin\AppData\Local\Temp\n5229\s5229.exe

          Filesize

          230KB

          MD5

          abaf13cb23de482dc944ab5b51ca3aac

          SHA1

          76837356db96dd56b647aba60f1adbbdc7b200fe

          SHA256

          b02fad5ac5234401505e1682c86f526951e8ded726687088c30987321f7c105e

          SHA512

          cc2aac30490511e49e1268f5df9139d176a3b849e663ad3b739e2f1cb50a6e084c465772ded5f694d5ec6f19ac40a57e5e64f7c47515f212476c20cbe9d6bce3

        • memory/1872-54-0x0000000075571000-0x0000000075573000-memory.dmp

          Filesize

          8KB

        • memory/1936-62-0x000007FEF43B0000-0x000007FEF4DD3000-memory.dmp

          Filesize

          10.1MB

        • memory/1936-63-0x000007FEF30D0000-0x000007FEF4166000-memory.dmp

          Filesize

          16.6MB

        • memory/1936-64-0x000007FEFB5C1000-0x000007FEFB5C3000-memory.dmp

          Filesize

          8KB

        • memory/1936-65-0x0000000001FC6000-0x0000000001FE5000-memory.dmp

          Filesize

          124KB

        • memory/1936-66-0x000007FEEDE50000-0x000007FEEECDF000-memory.dmp

          Filesize

          14.6MB

        • memory/1936-67-0x000007FEF1F40000-0x000007FEF222A000-memory.dmp

          Filesize

          2.9MB

        • memory/1936-68-0x0000000001FC6000-0x0000000001FE5000-memory.dmp

          Filesize

          124KB