Analysis

  • max time kernel
    36s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 03:30

General

  • Target

    ad5589e5c8b3e33c81bb00d7e19e507a7af649eb486992155f0599c1d65f3870.exe

  • Size

    233KB

  • MD5

    938300dafb217b27a21038d5c8fece64

  • SHA1

    9aafc1b8c219a88006d2f356cbe130c5233bc378

  • SHA256

    ad5589e5c8b3e33c81bb00d7e19e507a7af649eb486992155f0599c1d65f3870

  • SHA512

    3a84971b4b1fd5265a3fb2f47524a9c8c66241d30d883faf352a867c3b8ffb9f16ae902c8c106849c128e17acd42ef074e50858134480f9d57f3bcaa64d45654

  • SSDEEP

    6144:4xyMeM8tKmy/q7RglyFlqsGnK48uGSiU4pD:4xyMehti/8R7lJEGSiU4F

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad5589e5c8b3e33c81bb00d7e19e507a7af649eb486992155f0599c1d65f3870.exe
    "C:\Users\Admin\AppData\Local\Temp\ad5589e5c8b3e33c81bb00d7e19e507a7af649eb486992155f0599c1d65f3870.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Local\Temp\00189e99-dead-44a0-9260-f6bc74e8665f\start.hta
      2⤵
      • Modifies Internet Explorer settings
      PID:1600

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\00189e99-dead-44a0-9260-f6bc74e8665f\loader.gif

    Filesize

    1KB

    MD5

    e88ebd85dd56110ac6ea93fe0922988e

    SHA1

    684a31d864d33ff736234c41ac4e8d2c7f90d5ae

    SHA256

    379d1b0948f8e06366e7bcd197c848c0cc783787792f2224f98c16b974d920eb

    SHA512

    211b0760c9a887fc13c479617daeb6d5b6ee0ccd06c214967abd3e1f14204f72e34a6dd5eb778a9fc6ac7fc8bd63bdef80b347abab97becda16924cb3e164dc7

  • C:\Users\Admin\AppData\Local\Temp\00189e99-dead-44a0-9260-f6bc74e8665f\start.hta

    Filesize

    1KB

    MD5

    1e0053dfeeecf4c16284d6dad4fd86f4

    SHA1

    fe4ca30de707e1f77e5e258f62007f82633b6773

    SHA256

    e2d32f98e234880b02f55506b75e13ec992ed53f39c35c19bef070b081eea3bb

    SHA512

    5fb547735e5516f95ecb68bc5f862c7af963fe415a3aee9f2e4671473d1dbe36c65e2e2760900b96a81f5d27cb49b6f68c2f10d310ede93963ad78eea691e76b

  • \Users\Admin\AppData\Local\Temp\00189e99-dead-44a0-9260-f6bc74e8665f\helper.dll

    Filesize

    122KB

    MD5

    47cb6d4a317540d0fbbdbf813bd24d7f

    SHA1

    fdf0ca931b67bda1c62c157357dfb0729b9e9ee8

    SHA256

    d376d8192ece1fe69a9ec5a77fb512c41a3fe55417478635d7fe2d874e0ed49e

    SHA512

    1fb63ab4d7fb8fcc26f4c9333bbfa893b1253606035df6be8bfa2188e363372999f517bf63f061fa96047c5529a4170fc55c1f67828ae87c8a47b4b2362a1f80

  • memory/1916-54-0x0000000075C51000-0x0000000075C53000-memory.dmp

    Filesize

    8KB