Analysis

  • max time kernel
    171s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/11/2022, 02:58

General

  • Target

    ad618b5ab55b3985df1e64321f8c047715e38c3765b2bc7a3de529dcc807c8f4.exe

  • Size

    264KB

  • MD5

    7cb7c2f88d3658be701274af95facfb2

  • SHA1

    e24e31469c64d264e826c4c87a0641f814395659

  • SHA256

    ad618b5ab55b3985df1e64321f8c047715e38c3765b2bc7a3de529dcc807c8f4

  • SHA512

    37927ecad60e0d210edf5c21c6a096eca5d4bc114bf55444c900d9c8c1e0dbfb9cba256d559220eb0b9929d15c3ae3cec8a5f5ec4631fb117689e3ab298c2e3d

  • SSDEEP

    6144:Y2MF5/U5fNRwhoTFHvvlv6VY1zVsg1X4N24B4:0ZCfNRw+TFPdv6VABLUn4

Score
9/10

Malware Config

Signatures

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Modifies Control Panel 1 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad618b5ab55b3985df1e64321f8c047715e38c3765b2bc7a3de529dcc807c8f4.exe
    "C:\Users\Admin\AppData\Local\Temp\ad618b5ab55b3985df1e64321f8c047715e38c3765b2bc7a3de529dcc807c8f4.exe"
    1⤵
    • Modifies extensions of user files
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Users\Admin\AppData\Local\Temp\ad618b5ab55b3985df1e64321f8c047715e38c3765b2bc7a3de529dcc807c8f4.exe
      "C:\Users\Admin\AppData\Local\Temp\ad618b5ab55b3985df1e64321f8c047715e38c3765b2bc7a3de529dcc807c8f4.exe" g
      2⤵
        PID:1124

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1124-137-0x00000000005B0000-0x00000000005B5000-memory.dmp

            Filesize

            20KB

          • memory/1124-139-0x0000000000400000-0x0000000000452000-memory.dmp

            Filesize

            328KB

          • memory/1124-143-0x00000000005B0000-0x00000000005B5000-memory.dmp

            Filesize

            20KB

          • memory/1124-144-0x0000000000400000-0x0000000000452000-memory.dmp

            Filesize

            328KB

          • memory/3896-133-0x0000000000BD0000-0x0000000000BE4000-memory.dmp

            Filesize

            80KB

          • memory/3896-132-0x0000000000570000-0x0000000000575000-memory.dmp

            Filesize

            20KB

          • memory/3896-134-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/3896-135-0x0000000000400000-0x0000000000452000-memory.dmp

            Filesize

            328KB

          • memory/3896-140-0x0000000000570000-0x0000000000575000-memory.dmp

            Filesize

            20KB

          • memory/3896-141-0x0000000000BD0000-0x0000000000BE4000-memory.dmp

            Filesize

            80KB

          • memory/3896-142-0x0000000000400000-0x0000000000452000-memory.dmp

            Filesize

            328KB