Analysis

  • max time kernel
    151s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 18:23

General

  • Target

    04670a7a3b1e740d9019aa3ca77e4cd37bb08ad3fc25abd150c8d0b70784b783.exe

  • Size

    725KB

  • MD5

    9b221a5e407da5e59976cdd73e204425

  • SHA1

    6e5c84a4e49d296b7d3ec4a377653895eb2f82b5

  • SHA256

    04670a7a3b1e740d9019aa3ca77e4cd37bb08ad3fc25abd150c8d0b70784b783

  • SHA512

    6670e5084e608e015d9c32372b20a5bf02e705bce2af8d434a383e7bf700940ff136a8070d6c2cd8d3fc0c4732e0fc101781943701953a24d7dfc705a6a8a9a3

  • SSDEEP

    12288:mK2mhAMJ/cPl5LMA2jpy98h7UZYE82Y5UKUL4n4y3Xp3SbSlI:H2O/Gl5PM17g6zwm4m53Sb2I

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04670a7a3b1e740d9019aa3ca77e4cd37bb08ad3fc25abd150c8d0b70784b783.exe
    "C:\Users\Admin\AppData\Local\Temp\04670a7a3b1e740d9019aa3ca77e4cd37bb08ad3fc25abd150c8d0b70784b783.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Users\Admin\twqudvq84\adqpuilnekzd.exe
      "C:\Users\Admin\twqudvq84\adqpuilnekzd.exe" kjlqavftrdkh
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
        3⤵
          PID:1480

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\TWQUDV~1\YABAZX~1.UIW
      Filesize

      81KB

      MD5

      fc1d46c26757b6c9814ea66696a2915f

      SHA1

      c2674cad0e17c2a1601d8bcd1518bd63636d8b55

      SHA256

      dfd5ed1c31876c5a029916eed49ad3d00e14b50baadc425f91c997f636d5c7f6

      SHA512

      15dc5b560ea68a18488a81d41728bc3338cf9be0d7b309d466c2918dbd8d9c2b308a3c996753fbff340ff5b2d6f0c815c8281b8fa3b93cd446ccdfb6864db870

    • C:\Users\Admin\TWQUDV~1\khficpndvn.FGT
      Filesize

      86B

      MD5

      f0fc2d3ab46d7b713255a0c05183e8be

      SHA1

      b7368f65a730ba46b277329a0f7c7b53ccfbcf7e

      SHA256

      b5673f6ec974623df0c1c01752cca07990bb8d70e6fa266ce8d4df2f58a18981

      SHA512

      bb08e1ad7cab500c86f5e23cae9f265181cde52deb2ddef8e995100a4fba9f28f46543e7663f3c15eba6a9a1f657bcafd9d0b8c9f5f21d65b6f55e6a135d1ee7

    • C:\Users\Admin\twqudvq84\adqpuilnekzd.exe
      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • C:\Users\Admin\twqudvq84\kjlqavftrdkh
      Filesize

      306.2MB

      MD5

      06af97aad260c8aef09b2a60990347d1

      SHA1

      df53285455eacb91197cc06c709ae7f18a58eef9

      SHA256

      92073be508678b847ae690b6f5a96f378eb4525b9f04a36ae9bf003848909eae

      SHA512

      efd3c5f3b305f2923e6dec0cf312d754481cb65af7f685e353eba580acc38d8953a503decc72ab2032c8f8e1a69ea28b3ad3b89d9c5c9be2d249b8f8a72c4a53

    • \Users\Admin\twqudvq84\adqpuilnekzd.exe
      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • \Users\Admin\twqudvq84\adqpuilnekzd.exe
      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • \Users\Admin\twqudvq84\adqpuilnekzd.exe
      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • \Users\Admin\twqudvq84\adqpuilnekzd.exe
      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • memory/1464-59-0x0000000000000000-mapping.dmp
    • memory/1480-66-0x0000000000402196-mapping.dmp
    • memory/1552-54-0x0000000075681000-0x0000000075683000-memory.dmp
      Filesize

      8KB