Analysis

  • max time kernel
    6s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 05:51

General

  • Target

    8b11b495598ce685b5cdee48839bb6737a90d819819e434af166b905bf0085b5.exe

  • Size

    122KB

  • MD5

    cfd22ac046396078452079aa17ab7be7

  • SHA1

    d4749cde32bd7317862dba79c2740fc5d7b0fe11

  • SHA256

    8b11b495598ce685b5cdee48839bb6737a90d819819e434af166b905bf0085b5

  • SHA512

    661f74a444a521ce1a18866c8ef103c15de55aa03de3d979ad58c43f2145bc4eac7fc1a25aa3801d36d9b61ef39a4216b80bf1914deba3d829cd1977f25c3ce3

  • SSDEEP

    3072:EmeDmBqskJXvmZzbuxUXW6iHTNnE/ympni42YJPx:E8ERt6ihnE/7F

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b11b495598ce685b5cdee48839bb6737a90d819819e434af166b905bf0085b5.exe
    "C:\Users\Admin\AppData\Local\Temp\8b11b495598ce685b5cdee48839bb6737a90d819819e434af166b905bf0085b5.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Common Files\PushWare\cpush.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:736

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\PushWare\cpush.dll
    Filesize

    192KB

    MD5

    bfdbdf62c357e9b45d91472d256e9e90

    SHA1

    23e0a82afae565143bd4f09327f4c20c21076922

    SHA256

    557d603e74554d5ad7e32d198a7c529c8b3aeac3c90fbcb64a87bc6df5515241

    SHA512

    ccead0a144df2fcbdf3591344a2825d65ac005d03fd46cb48f05bd2ceddf873232a3073693e21db36c26cd6a83b146e027bf759b3eeb4e04666d5e8d302c95e1

  • \Program Files (x86)\Common Files\PushWare\cpush.dll
    Filesize

    192KB

    MD5

    bfdbdf62c357e9b45d91472d256e9e90

    SHA1

    23e0a82afae565143bd4f09327f4c20c21076922

    SHA256

    557d603e74554d5ad7e32d198a7c529c8b3aeac3c90fbcb64a87bc6df5515241

    SHA512

    ccead0a144df2fcbdf3591344a2825d65ac005d03fd46cb48f05bd2ceddf873232a3073693e21db36c26cd6a83b146e027bf759b3eeb4e04666d5e8d302c95e1

  • memory/736-55-0x0000000000000000-mapping.dmp
  • memory/2028-54-0x0000000076651000-0x0000000076653000-memory.dmp
    Filesize

    8KB