Analysis

  • max time kernel
    138s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 09:46

General

  • Target

    4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe

  • Size

    871KB

  • MD5

    1417f7e2ae00744ac58839a19165a350

  • SHA1

    8ca309aaa3723162d5358c00133cef1352ca7d39

  • SHA256

    4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db

  • SHA512

    428cae189a7c15e57318530ec5bbd9d55c3a62320451be36da4c56bb761c1e66a31259b7bad7dd19ead2e3a199e2b5d420a7665a76cd3ac7fa7063e3f9f97b8f

  • SSDEEP

    24576:Iue3Z3DBQYqDeZe6yMpaPRhamNMSOHH34ykPGt4sTyHEc:Iu+NDqYqDKe6laRBVC5k+ZyHEc

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe
    "C:\Users\Admin\AppData\Local\Temp\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\launch.exe
      C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\launch.exe "e4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe" "4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe" "e5c0fa76567040339f95fe113177bb4e" dec
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1396
    • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe
      C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe /path="C:\Users\Admin\AppData\Local\Temp\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:440

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\46DE64130271B61D13A0FAFD9465377C_D8840AF2A28227DC3600C6CA04024DE2

    Filesize

    1KB

    MD5

    7732f077eaacfc347275fec171a2bf7e

    SHA1

    fa4462662759b837bfc3e2b64f53384d19987d92

    SHA256

    5797a1145210b025bff94e0e41374a2c48348460b8b92eb991d79dc8b6afbb03

    SHA512

    01f608d0ed4d42329732434501f263cbd9ab939b7525086388987a6552078456bcf73fe51a2e2e9e1f318a1969a59124cfbbd0df5b8fd3015661847d94928212

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BBB768C456D9E2DCD3EF595C400D483D_64C05B9EB32FC3D0CE6CB126561EEBFF

    Filesize

    1KB

    MD5

    8cc40061962d79d8887195a75e41c26c

    SHA1

    bb2888743678151da82ffa1d56396c2a852c1475

    SHA256

    551c972945e2b9bc16fa9787201f1ba80c3e27cac6a142f91ca2d5dec431e52b

    SHA512

    e8048ced8442774bc749deca1213d85a6d16dd404fe38cc1f91296d531ff40dd67360b95f76886420bb42f59e06c18c128d37252745c982e3444d79d5fc0aa11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\46DE64130271B61D13A0FAFD9465377C_D8840AF2A28227DC3600C6CA04024DE2

    Filesize

    466B

    MD5

    31438df1a283a68fa492b632aef44e48

    SHA1

    768aef66db7b5bfc0c228e98abeabb4d385e4a4e

    SHA256

    571d0b2fd88c13715ca6c96a2ba7c3e6116186c6c0138653410b7cf329a9508f

    SHA512

    6249777a8776db32aafa2a841ce305754ced28738ddb63f18c8ffe923d94794a8e259b17678a28b0c59e5d39bdd90e5e44058d8da8e5b1be67bc5eba96ee2534

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f1d15382cf1a668f35e6ab3ef53a836

    SHA1

    37d695bbd210e5b3f11f0bf0131a2cbf2d04bd5c

    SHA256

    28d7cfd1c95795aae1a3d1006f7de53e7bea2cba188dd0fee2c2e9bed5b57919

    SHA512

    9e0f9ac5b386801f1c4c88e9549e16a75cf685d86ad06d1464af74306164b9983f1e55843901e4dbfc6bf12c0398b3da48ed70b35ece421557569df16a7ec2e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BBB768C456D9E2DCD3EF595C400D483D_64C05B9EB32FC3D0CE6CB126561EEBFF

    Filesize

    444B

    MD5

    12e8bcdf6921270eb4f2dcda49096347

    SHA1

    7cee366e00f4395c89f81ba230c744acb51eb26e

    SHA256

    903054ae69aac23efbf2ceb01e700ea50bb798d6fce2a14ffd8750e6e37106a9

    SHA512

    afc934e1cde66e3107bcdcb1b07471473a3241d75016b65d50ae3c51f5b3b3135b14b3832af46b43976bcc7879317c0e1789c4d39afca2dcb3c36899199a279c

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe

    Filesize

    388KB

    MD5

    e17934721d82a772501102dc018f3e7a

    SHA1

    0f96375ae1df856c8d9d99203cf85e8312b80a80

    SHA256

    1f3467f13bb7d608582899910ddbdd6b56d349ef83e81ada358841a117609713

    SHA512

    6cf093ddd1b76a70e0245aef19dc9595e25b06577a2bbd5e0d8b5eaa0510f934bd33ca4f10c6326317ea0887adc5ebed18a9b08031c12c6c285ed7febb6c5bad

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe

    Filesize

    388KB

    MD5

    e17934721d82a772501102dc018f3e7a

    SHA1

    0f96375ae1df856c8d9d99203cf85e8312b80a80

    SHA256

    1f3467f13bb7d608582899910ddbdd6b56d349ef83e81ada358841a117609713

    SHA512

    6cf093ddd1b76a70e0245aef19dc9595e25b06577a2bbd5e0d8b5eaa0510f934bd33ca4f10c6326317ea0887adc5ebed18a9b08031c12c6c285ed7febb6c5bad

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe.config

    Filesize

    690B

    MD5

    bca0ea75b6940aa86960d7b9098a5998

    SHA1

    3d57f82158ac72c7eb2e72ba19a80485d8103130

    SHA256

    5a494295936d2170433864b449257bbac7b976413811a0b6339e37f83a891f8d

    SHA512

    260a05c509d874239a27798421ee75ac7e2bbc0d2a0485122740e8b8adcd8f43f98f7633cef278d9f7f4a132633b4b1cdf4b641e2233e891dce2d6eb6e75c3d3

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\e4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe

    Filesize

    388KB

    MD5

    2f7044ac477a68f30a3b8c26b396a247

    SHA1

    b890ad6bfe6a1dfbac038cfeaf0f3cec3f24413e

    SHA256

    5046b0cded06af3ffb178031df384d78e8779db7c93d80f73affad42d24d88f9

    SHA512

    3cdd3c5caab7ba613dfcc887e43c5e8d6d5f7521525cf412552cafb913c115f255e40d1104876f98fd1f7922bd4a83395199a2f35278575628c424cfa63388ee

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\installer.exe

    Filesize

    871KB

    MD5

    1417f7e2ae00744ac58839a19165a350

    SHA1

    8ca309aaa3723162d5358c00133cef1352ca7d39

    SHA256

    4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db

    SHA512

    428cae189a7c15e57318530ec5bbd9d55c3a62320451be36da4c56bb761c1e66a31259b7bad7dd19ead2e3a199e2b5d420a7665a76cd3ac7fa7063e3f9f97b8f

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\launch.exe

    Filesize

    26KB

    MD5

    1a333b5e9cf28be2febedfd805e2cf5c

    SHA1

    24c3a57cf6f2553d006a5e03155b056b71e96e0f

    SHA256

    da98a5ab1f2a1437791e5b3fe8eda52c8119ff852a76189fcfc2e8e2bb5b2ee2

    SHA512

    42b2ce79719f616dd5623e28fe8bef5318a0dce9b67537907f459e9d960921f0df12b3d253dd4366184b0b0cd686d72de6c3ecf52a133843a460a44bf0fdbe91

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\launch.exe

    Filesize

    26KB

    MD5

    1a333b5e9cf28be2febedfd805e2cf5c

    SHA1

    24c3a57cf6f2553d006a5e03155b056b71e96e0f

    SHA256

    da98a5ab1f2a1437791e5b3fe8eda52c8119ff852a76189fcfc2e8e2bb5b2ee2

    SHA512

    42b2ce79719f616dd5623e28fe8bef5318a0dce9b67537907f459e9d960921f0df12b3d253dd4366184b0b0cd686d72de6c3ecf52a133843a460a44bf0fdbe91

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\launch.exe.config

    Filesize

    359B

    MD5

    05a59e8e79546860cf1e351e32e69404

    SHA1

    aef4ad7bcbd79f99feb7100f05938721f12f7dce

    SHA256

    a368ee85ee624c5adaad674a9b5986f17de7020206e93755c0d086714fcc9430

    SHA512

    6ec6d988e5c4736ca56118926fef22f952991688bee8408b782273622f2a1f5d8c57850bdb1992f70c23df42366bec56527ad1395484aa5916d84e1249d159fa

  • \Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe

    Filesize

    388KB

    MD5

    e17934721d82a772501102dc018f3e7a

    SHA1

    0f96375ae1df856c8d9d99203cf85e8312b80a80

    SHA256

    1f3467f13bb7d608582899910ddbdd6b56d349ef83e81ada358841a117609713

    SHA512

    6cf093ddd1b76a70e0245aef19dc9595e25b06577a2bbd5e0d8b5eaa0510f934bd33ca4f10c6326317ea0887adc5ebed18a9b08031c12c6c285ed7febb6c5bad

  • \Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\launch.exe

    Filesize

    26KB

    MD5

    1a333b5e9cf28be2febedfd805e2cf5c

    SHA1

    24c3a57cf6f2553d006a5e03155b056b71e96e0f

    SHA256

    da98a5ab1f2a1437791e5b3fe8eda52c8119ff852a76189fcfc2e8e2bb5b2ee2

    SHA512

    42b2ce79719f616dd5623e28fe8bef5318a0dce9b67537907f459e9d960921f0df12b3d253dd4366184b0b0cd686d72de6c3ecf52a133843a460a44bf0fdbe91

  • \Users\Admin\AppData\Local\Temp\nsdEB5B.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • memory/440-77-0x000007FEF3F40000-0x000007FEF4963000-memory.dmp

    Filesize

    10.1MB

  • memory/440-78-0x000007FEF2EA0000-0x000007FEF3F36000-memory.dmp

    Filesize

    16.6MB

  • memory/1396-65-0x00000000744F0000-0x0000000074A9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1396-63-0x00000000744F0000-0x0000000074A9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1980-54-0x00000000756B1000-0x00000000756B3000-memory.dmp

    Filesize

    8KB

  • memory/1980-56-0x0000000074C41000-0x0000000074C43000-memory.dmp

    Filesize

    8KB