Analysis

  • max time kernel
    150s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 03:35

General

  • Target

    6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe

  • Size

    180KB

  • MD5

    11228d041ea74807cf6e28976b842db7

  • SHA1

    016814ebbf000c216d10b185c2b79cd51be79696

  • SHA256

    6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153

  • SHA512

    3358daa7f26434e265b3ca173804a51d105fff43d63b3f18913c18b17003705e69860514d2839cdd83ea81f15fc1edbdde165262eac3265b69fdec14b9ab133f

  • SSDEEP

    3072:bvUbnMDcnVGgkqsA4vowyVRyA7W0SJVH5FqQ117:rUbnuchz4vuitJVH5

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Stops running service(s) 3 TTPs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 7 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe
    "C:\Users\Admin\AppData\Local\Temp\6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Windows\SysWOW64\system.exe
      C:\Windows\system32\system.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:928
      • C:\Windows\SysWOW64\Rundll32.exe
        Rundll32 C:\Windows\system32\faqgmw.dll Exbcute
        3⤵
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2024
        • C:\Windows\SysWOW64\net.exe
          net stop WinDefend
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:812
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop WinDefend
            5⤵
              PID:1668
          • C:\Windows\SysWOW64\net.exe
            net stop MpsSvc
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1328
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop MpsSvc
              5⤵
                PID:1952
            • C:\Windows\SysWOW64\sc.exe
              sc config WinDefend start= disabled
              4⤵
              • Launches sc.exe
              PID:344
            • C:\Windows\SysWOW64\sc.exe
              sc config MpsSvc start= disabled
              4⤵
              • Launches sc.exe
              PID:588
            • C:\Windows\SysWOW64\sc.exe
              sc stop ZhuDongFangYu
              4⤵
              • Launches sc.exe
              PID:536
            • C:\Windows\SysWOW64\sc.exe
              sc delete ZhuDongFangYu
              4⤵
              • Launches sc.exe
              PID:1196
            • C:\Windows\SysWOW64\sc.exe
              sc delete 360rp
              4⤵
              • Launches sc.exe
              PID:1928
            • C:\Windows\SysWOW64\sc.exe
              sc stop 360rp
              4⤵
              • Launches sc.exe
              PID:1216
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" stop PolicyAgent
              4⤵
              • Launches sc.exe
              PID:1072
          • C:\Windows\SysWOW64\Rundll32.exe
            Rundll32 C:\Windows\system32\ecchmw.dll Exbcute
            3⤵
            • Loads dropped DLL
            • Adds Run key to start application
            • Enumerates connected drives
            • Suspicious behavior: EnumeratesProcesses
            PID:1672
        • C:\Users\Admin\AppData\Local\Temp\6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe
          C:\Users\Admin\AppData\Local\Temp\6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1028

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe

        Filesize

        28KB

        MD5

        e197c221c103e06a0769e83fb6f8ccf0

        SHA1

        91e0aae428ed1ce89293dcbb51f4e648baf9f801

        SHA256

        5d3f13d9bf1a6b0566216b46c93fb0a5aeb3f1d55a1ce1a7548482b1c34d43ed

        SHA512

        4ebf4dfc0df262fb61340f27706d2ee5761a340259e542f4b97d9cd241cfb7a28d34a5cbacfb4f4534505aabd602c9af0cc66055b72c91af9a70fe3cac40e548

      • C:\Windows\SysWOW64\ecchmw.dll

        Filesize

        24KB

        MD5

        9ff4fef4569fa53b7f552cc2cbc70861

        SHA1

        5cb6537fedabcd0bfc62a4e8cdb5d27a61a1bb8e

        SHA256

        df7f78a1f7324d1014f1b7b83337d41f5141451564ea33a8e10028b0602c3d97

        SHA512

        11e1119804120d984a94e9933f8296ac085c74b4a32aa6cdfd5472c8bb47d872ecf7cddc01d3681392d86ed929870203221cac74cffe807206b0bacb353f896b

      • C:\Windows\SysWOW64\faqgmw.dll

        Filesize

        75KB

        MD5

        ad560c9ffe18b4d015d97f33288c7444

        SHA1

        8dc0f8f4d174587506e657ee624887da4dab5995

        SHA256

        2e04a72897eb14437bb81c5cd785b84c7c42c901230719d3630b9c2b359b3574

        SHA512

        9369ea6eb8d54952c58a95d6d513487f89f5d948604b29366160c28319f575736dfe5041b26c030aa6c3f99f1af1e8ed63271bcaf0279fbed97971583d23d551

      • C:\Windows\SysWOW64\system.exe

        Filesize

        142KB

        MD5

        4a758f52dcab4ab7557bcb0de47fa5ff

        SHA1

        556f7de6f5d15ae45e8602fae269c94bc7919491

        SHA256

        75e7148f77faf32a30662ce62d2f6676478add52522842c193e9ed35d9de66a0

        SHA512

        4234905c4d6c57e31b2f6b44010563cc39090cf589beaf53ef4754edfa7f65a5d253d8622853c7edc65e18e648b9392f38e05ecdae99e48001a0ff5dab5ec3f9

      • C:\Windows\SysWOW64\system.exe

        Filesize

        142KB

        MD5

        4a758f52dcab4ab7557bcb0de47fa5ff

        SHA1

        556f7de6f5d15ae45e8602fae269c94bc7919491

        SHA256

        75e7148f77faf32a30662ce62d2f6676478add52522842c193e9ed35d9de66a0

        SHA512

        4234905c4d6c57e31b2f6b44010563cc39090cf589beaf53ef4754edfa7f65a5d253d8622853c7edc65e18e648b9392f38e05ecdae99e48001a0ff5dab5ec3f9

      • \Users\Admin\AppData\Local\Temp\25AB.tmp

        Filesize

        1.7MB

        MD5

        b5eb5bd3066959611e1f7a80fd6cc172

        SHA1

        6fb1532059212c840737b3f923a9c0b152c0887a

        SHA256

        1ffb68a66f28f604adcae9c135f8dcf301316ab7fda8ebd294583c56dd26f7cc

        SHA512

        6c0743e0ff4922e859ba66b68040ab994dbae33e80c63ce8c993ad31a0c7aad6c6467484da1550063214953cd641dbf597438dd0c02f24164505d88ca80ea1b6

      • \Users\Admin\AppData\Local\Temp\6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe

        Filesize

        28KB

        MD5

        e197c221c103e06a0769e83fb6f8ccf0

        SHA1

        91e0aae428ed1ce89293dcbb51f4e648baf9f801

        SHA256

        5d3f13d9bf1a6b0566216b46c93fb0a5aeb3f1d55a1ce1a7548482b1c34d43ed

        SHA512

        4ebf4dfc0df262fb61340f27706d2ee5761a340259e542f4b97d9cd241cfb7a28d34a5cbacfb4f4534505aabd602c9af0cc66055b72c91af9a70fe3cac40e548

      • \Windows\SysWOW64\ecchmw.dll

        Filesize

        24KB

        MD5

        9ff4fef4569fa53b7f552cc2cbc70861

        SHA1

        5cb6537fedabcd0bfc62a4e8cdb5d27a61a1bb8e

        SHA256

        df7f78a1f7324d1014f1b7b83337d41f5141451564ea33a8e10028b0602c3d97

        SHA512

        11e1119804120d984a94e9933f8296ac085c74b4a32aa6cdfd5472c8bb47d872ecf7cddc01d3681392d86ed929870203221cac74cffe807206b0bacb353f896b

      • \Windows\SysWOW64\ecchmw.dll

        Filesize

        24KB

        MD5

        9ff4fef4569fa53b7f552cc2cbc70861

        SHA1

        5cb6537fedabcd0bfc62a4e8cdb5d27a61a1bb8e

        SHA256

        df7f78a1f7324d1014f1b7b83337d41f5141451564ea33a8e10028b0602c3d97

        SHA512

        11e1119804120d984a94e9933f8296ac085c74b4a32aa6cdfd5472c8bb47d872ecf7cddc01d3681392d86ed929870203221cac74cffe807206b0bacb353f896b

      • \Windows\SysWOW64\ecchmw.dll

        Filesize

        24KB

        MD5

        9ff4fef4569fa53b7f552cc2cbc70861

        SHA1

        5cb6537fedabcd0bfc62a4e8cdb5d27a61a1bb8e

        SHA256

        df7f78a1f7324d1014f1b7b83337d41f5141451564ea33a8e10028b0602c3d97

        SHA512

        11e1119804120d984a94e9933f8296ac085c74b4a32aa6cdfd5472c8bb47d872ecf7cddc01d3681392d86ed929870203221cac74cffe807206b0bacb353f896b

      • \Windows\SysWOW64\ecchmw.dll

        Filesize

        24KB

        MD5

        9ff4fef4569fa53b7f552cc2cbc70861

        SHA1

        5cb6537fedabcd0bfc62a4e8cdb5d27a61a1bb8e

        SHA256

        df7f78a1f7324d1014f1b7b83337d41f5141451564ea33a8e10028b0602c3d97

        SHA512

        11e1119804120d984a94e9933f8296ac085c74b4a32aa6cdfd5472c8bb47d872ecf7cddc01d3681392d86ed929870203221cac74cffe807206b0bacb353f896b

      • \Windows\SysWOW64\faqgmw.dll

        Filesize

        75KB

        MD5

        ad560c9ffe18b4d015d97f33288c7444

        SHA1

        8dc0f8f4d174587506e657ee624887da4dab5995

        SHA256

        2e04a72897eb14437bb81c5cd785b84c7c42c901230719d3630b9c2b359b3574

        SHA512

        9369ea6eb8d54952c58a95d6d513487f89f5d948604b29366160c28319f575736dfe5041b26c030aa6c3f99f1af1e8ed63271bcaf0279fbed97971583d23d551

      • \Windows\SysWOW64\faqgmw.dll

        Filesize

        75KB

        MD5

        ad560c9ffe18b4d015d97f33288c7444

        SHA1

        8dc0f8f4d174587506e657ee624887da4dab5995

        SHA256

        2e04a72897eb14437bb81c5cd785b84c7c42c901230719d3630b9c2b359b3574

        SHA512

        9369ea6eb8d54952c58a95d6d513487f89f5d948604b29366160c28319f575736dfe5041b26c030aa6c3f99f1af1e8ed63271bcaf0279fbed97971583d23d551

      • \Windows\SysWOW64\faqgmw.dll

        Filesize

        75KB

        MD5

        ad560c9ffe18b4d015d97f33288c7444

        SHA1

        8dc0f8f4d174587506e657ee624887da4dab5995

        SHA256

        2e04a72897eb14437bb81c5cd785b84c7c42c901230719d3630b9c2b359b3574

        SHA512

        9369ea6eb8d54952c58a95d6d513487f89f5d948604b29366160c28319f575736dfe5041b26c030aa6c3f99f1af1e8ed63271bcaf0279fbed97971583d23d551

      • \Windows\SysWOW64\faqgmw.dll

        Filesize

        75KB

        MD5

        ad560c9ffe18b4d015d97f33288c7444

        SHA1

        8dc0f8f4d174587506e657ee624887da4dab5995

        SHA256

        2e04a72897eb14437bb81c5cd785b84c7c42c901230719d3630b9c2b359b3574

        SHA512

        9369ea6eb8d54952c58a95d6d513487f89f5d948604b29366160c28319f575736dfe5041b26c030aa6c3f99f1af1e8ed63271bcaf0279fbed97971583d23d551

      • \Windows\SysWOW64\system.exe

        Filesize

        142KB

        MD5

        4a758f52dcab4ab7557bcb0de47fa5ff

        SHA1

        556f7de6f5d15ae45e8602fae269c94bc7919491

        SHA256

        75e7148f77faf32a30662ce62d2f6676478add52522842c193e9ed35d9de66a0

        SHA512

        4234905c4d6c57e31b2f6b44010563cc39090cf589beaf53ef4754edfa7f65a5d253d8622853c7edc65e18e648b9392f38e05ecdae99e48001a0ff5dab5ec3f9

      • \Windows\SysWOW64\system.exe

        Filesize

        142KB

        MD5

        4a758f52dcab4ab7557bcb0de47fa5ff

        SHA1

        556f7de6f5d15ae45e8602fae269c94bc7919491

        SHA256

        75e7148f77faf32a30662ce62d2f6676478add52522842c193e9ed35d9de66a0

        SHA512

        4234905c4d6c57e31b2f6b44010563cc39090cf589beaf53ef4754edfa7f65a5d253d8622853c7edc65e18e648b9392f38e05ecdae99e48001a0ff5dab5ec3f9

      • memory/344-68-0x0000000000000000-mapping.dmp

      • memory/536-70-0x0000000000000000-mapping.dmp

      • memory/588-69-0x0000000000000000-mapping.dmp

      • memory/812-66-0x0000000000000000-mapping.dmp

      • memory/928-57-0x0000000000000000-mapping.dmp

      • memory/1000-71-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/1000-54-0x0000000076561000-0x0000000076563000-memory.dmp

        Filesize

        8KB

      • memory/1028-87-0x0000000000000000-mapping.dmp

      • memory/1072-77-0x0000000000000000-mapping.dmp

      • memory/1196-72-0x0000000000000000-mapping.dmp

      • memory/1216-73-0x0000000000000000-mapping.dmp

      • memory/1328-67-0x0000000000000000-mapping.dmp

      • memory/1668-75-0x0000000000000000-mapping.dmp

      • memory/1672-78-0x0000000000000000-mapping.dmp

      • memory/1928-74-0x0000000000000000-mapping.dmp

      • memory/1952-76-0x0000000000000000-mapping.dmp

      • memory/2024-59-0x0000000000000000-mapping.dmp