Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 09:46

General

  • Target

    4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe

  • Size

    871KB

  • MD5

    1417f7e2ae00744ac58839a19165a350

  • SHA1

    8ca309aaa3723162d5358c00133cef1352ca7d39

  • SHA256

    4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db

  • SHA512

    428cae189a7c15e57318530ec5bbd9d55c3a62320451be36da4c56bb761c1e66a31259b7bad7dd19ead2e3a199e2b5d420a7665a76cd3ac7fa7063e3f9f97b8f

  • SSDEEP

    24576:Iue3Z3DBQYqDeZe6yMpaPRhamNMSOHH34ykPGt4sTyHEc:Iu+NDqYqDKe6laRBVC5k+ZyHEc

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe
    "C:\Users\Admin\AppData\Local\Temp\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\launch.exe
      C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\launch.exe "e4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe" "4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe" "e5c0fa76567040339f95fe113177bb4e" dec
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:3364
    • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe
      C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe /path="C:\Users\Admin\AppData\Local\Temp\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\46DE64130271B61D13A0FAFD9465377C_D8840AF2A28227DC3600C6CA04024DE2

    Filesize

    1KB

    MD5

    7732f077eaacfc347275fec171a2bf7e

    SHA1

    fa4462662759b837bfc3e2b64f53384d19987d92

    SHA256

    5797a1145210b025bff94e0e41374a2c48348460b8b92eb991d79dc8b6afbb03

    SHA512

    01f608d0ed4d42329732434501f263cbd9ab939b7525086388987a6552078456bcf73fe51a2e2e9e1f318a1969a59124cfbbd0df5b8fd3015661847d94928212

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BBB768C456D9E2DCD3EF595C400D483D_64C05B9EB32FC3D0CE6CB126561EEBFF

    Filesize

    1KB

    MD5

    8cc40061962d79d8887195a75e41c26c

    SHA1

    bb2888743678151da82ffa1d56396c2a852c1475

    SHA256

    551c972945e2b9bc16fa9787201f1ba80c3e27cac6a142f91ca2d5dec431e52b

    SHA512

    e8048ced8442774bc749deca1213d85a6d16dd404fe38cc1f91296d531ff40dd67360b95f76886420bb42f59e06c18c128d37252745c982e3444d79d5fc0aa11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\46DE64130271B61D13A0FAFD9465377C_D8840AF2A28227DC3600C6CA04024DE2

    Filesize

    466B

    MD5

    e5c7a8a51a37b949c87e76dd5a976d2a

    SHA1

    2b97b49fae2c7117ba01f0343efd7b9963ead050

    SHA256

    4afb158808ded10456db04e506002f5e5952f85c030d5d6ad4865dea5093d3b4

    SHA512

    98c84051d2453c2f2243ba706fb2cfcc4e7f19133360d39c9b8238faf9a9b720ae7cc2a1c3bac9bb84bcca49e905e7a68aed59e6885c30fec160e29bda394bb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BBB768C456D9E2DCD3EF595C400D483D_64C05B9EB32FC3D0CE6CB126561EEBFF

    Filesize

    444B

    MD5

    a33f1c1ff0648b875f15a070e6d14df5

    SHA1

    eb8cb563cfaecf27910057b3906971ec2f91a80d

    SHA256

    2f9a12723ba874210f45eaf41c3d670bcc1e733009c34f99e507083fa69c5485

    SHA512

    90d19e457bd3ea90f0ab7f8e8b5998a5ca7df5383c6f6c5dbee8dfaa1b6b968ca0f00f7faca7b4d97a897c6201a6fbeb42d98da10125a7bc071c569ce6cd4af1

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe

    Filesize

    388KB

    MD5

    e17934721d82a772501102dc018f3e7a

    SHA1

    0f96375ae1df856c8d9d99203cf85e8312b80a80

    SHA256

    1f3467f13bb7d608582899910ddbdd6b56d349ef83e81ada358841a117609713

    SHA512

    6cf093ddd1b76a70e0245aef19dc9595e25b06577a2bbd5e0d8b5eaa0510f934bd33ca4f10c6326317ea0887adc5ebed18a9b08031c12c6c285ed7febb6c5bad

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe

    Filesize

    388KB

    MD5

    e17934721d82a772501102dc018f3e7a

    SHA1

    0f96375ae1df856c8d9d99203cf85e8312b80a80

    SHA256

    1f3467f13bb7d608582899910ddbdd6b56d349ef83e81ada358841a117609713

    SHA512

    6cf093ddd1b76a70e0245aef19dc9595e25b06577a2bbd5e0d8b5eaa0510f934bd33ca4f10c6326317ea0887adc5ebed18a9b08031c12c6c285ed7febb6c5bad

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe.config

    Filesize

    690B

    MD5

    bca0ea75b6940aa86960d7b9098a5998

    SHA1

    3d57f82158ac72c7eb2e72ba19a80485d8103130

    SHA256

    5a494295936d2170433864b449257bbac7b976413811a0b6339e37f83a891f8d

    SHA512

    260a05c509d874239a27798421ee75ac7e2bbc0d2a0485122740e8b8adcd8f43f98f7633cef278d9f7f4a132633b4b1cdf4b641e2233e891dce2d6eb6e75c3d3

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\e4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe

    Filesize

    388KB

    MD5

    2f7044ac477a68f30a3b8c26b396a247

    SHA1

    b890ad6bfe6a1dfbac038cfeaf0f3cec3f24413e

    SHA256

    5046b0cded06af3ffb178031df384d78e8779db7c93d80f73affad42d24d88f9

    SHA512

    3cdd3c5caab7ba613dfcc887e43c5e8d6d5f7521525cf412552cafb913c115f255e40d1104876f98fd1f7922bd4a83395199a2f35278575628c424cfa63388ee

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\installer.exe

    Filesize

    871KB

    MD5

    1417f7e2ae00744ac58839a19165a350

    SHA1

    8ca309aaa3723162d5358c00133cef1352ca7d39

    SHA256

    4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db

    SHA512

    428cae189a7c15e57318530ec5bbd9d55c3a62320451be36da4c56bb761c1e66a31259b7bad7dd19ead2e3a199e2b5d420a7665a76cd3ac7fa7063e3f9f97b8f

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\launch.exe

    Filesize

    26KB

    MD5

    1a333b5e9cf28be2febedfd805e2cf5c

    SHA1

    24c3a57cf6f2553d006a5e03155b056b71e96e0f

    SHA256

    da98a5ab1f2a1437791e5b3fe8eda52c8119ff852a76189fcfc2e8e2bb5b2ee2

    SHA512

    42b2ce79719f616dd5623e28fe8bef5318a0dce9b67537907f459e9d960921f0df12b3d253dd4366184b0b0cd686d72de6c3ecf52a133843a460a44bf0fdbe91

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\launch.exe

    Filesize

    26KB

    MD5

    1a333b5e9cf28be2febedfd805e2cf5c

    SHA1

    24c3a57cf6f2553d006a5e03155b056b71e96e0f

    SHA256

    da98a5ab1f2a1437791e5b3fe8eda52c8119ff852a76189fcfc2e8e2bb5b2ee2

    SHA512

    42b2ce79719f616dd5623e28fe8bef5318a0dce9b67537907f459e9d960921f0df12b3d253dd4366184b0b0cd686d72de6c3ecf52a133843a460a44bf0fdbe91

  • C:\Users\Admin\AppData\Local\Temp\DM\4a3860fa437dc604e6086700725fc90cd4d2ced900cb2045b7ad607d243a26db.exe\c33467838e2a4c62852dc95b333b508b\launch.exe.config

    Filesize

    359B

    MD5

    05a59e8e79546860cf1e351e32e69404

    SHA1

    aef4ad7bcbd79f99feb7100f05938721f12f7dce

    SHA256

    a368ee85ee624c5adaad674a9b5986f17de7020206e93755c0d086714fcc9430

    SHA512

    6ec6d988e5c4736ca56118926fef22f952991688bee8408b782273622f2a1f5d8c57850bdb1992f70c23df42366bec56527ad1395484aa5916d84e1249d159fa

  • C:\Users\Admin\AppData\Local\Temp\nsdE9BB.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • memory/2116-152-0x00007FFB3BBF0000-0x00007FFB3C626000-memory.dmp

    Filesize

    10.2MB

  • memory/2116-153-0x0000000001AEA000-0x0000000001AEF000-memory.dmp

    Filesize

    20KB

  • memory/2116-155-0x0000000001AEA000-0x0000000001AEF000-memory.dmp

    Filesize

    20KB

  • memory/3364-140-0x0000000072D10000-0x00000000732C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3364-143-0x0000000072D10000-0x00000000732C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3364-142-0x0000000072D10000-0x00000000732C1000-memory.dmp

    Filesize

    5.7MB