Analysis

  • max time kernel
    20s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 10:09

General

  • Target

    2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8.exe

  • Size

    127KB

  • MD5

    12ae9854902cdae36a089d831462f410

  • SHA1

    2a60c6ddf60d5bb2e41cd7eb42c3ccbed5892fad

  • SHA256

    2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8

  • SHA512

    08760071161a390b18781ec5da3805ced18e5cc7358b230d99c044999769d40a4ab8f5f4226e2d50485a919298a11ba3b5cfd8b2d47f1c1ed42d32bda1b0f91e

  • SSDEEP

    3072:peBW+vBDUfBa6GehbUrg4Rq1k6DpjzVnT2QD7sSfL/U:gBbvBKs/rgRk6DplnB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8.exe
    "C:\Users\Admin\AppData\Local\Temp\2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Rdf..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Rdf..bat

    Filesize

    274B

    MD5

    abb0e0b4bb46c8529e000d6c5fcb1de4

    SHA1

    5b9eac8942c22195d085732a269b89476652e1e7

    SHA256

    6334335aafe1fe12b7acb98ea5c7a501a4b24fc3df71d3d8c5c84dd2409d2bc6

    SHA512

    40c946ecc36a0a4f408cc490c0b62f859d3df9caaab47c18a251d11a3c1bce47136eafa7b7bbe7dc95b25c1c3e61418d0222e5477bb40a6b1f82bb5effb74adc

  • memory/772-57-0x0000000000000000-mapping.dmp

  • memory/2028-54-0x0000000000220000-0x000000000024E000-memory.dmp

    Filesize

    184KB

  • memory/2028-55-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2028-56-0x0000000076AE1000-0x0000000076AE3000-memory.dmp

    Filesize

    8KB