Analysis

  • max time kernel
    26s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 12:01

General

  • Target

    9e386ef571282428a7a0f3c0ad516f8e698320a56a4443f6e747b3ba9fe4fa81.exe

  • Size

    1.0MB

  • MD5

    9a4385e2b12606dbd725315f47b04b9d

  • SHA1

    fea8e5d671cc59f44e883527e41ab6b03e3ff1a6

  • SHA256

    9e386ef571282428a7a0f3c0ad516f8e698320a56a4443f6e747b3ba9fe4fa81

  • SHA512

    9acf7a51afa681a0277147036bdfd4eb27ff658163addfae3866f5889da6aa5790579f68723fd5cae96e3bda8ab29b77e26f5df0f6a8e58b62d4772e5b6ca67b

  • SSDEEP

    24576:ypxYK6O0iy7g9fokmp0fdBGMyKmg/iuWkyU+5t2w7/ruk:ypxYfOu7g1VSgdBcyirkyU0tWk

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e386ef571282428a7a0f3c0ad516f8e698320a56a4443f6e747b3ba9fe4fa81.exe
    "C:\Users\Admin\AppData\Local\Temp\9e386ef571282428a7a0f3c0ad516f8e698320a56a4443f6e747b3ba9fe4fa81.exe"
    1⤵
    • Loads dropped DLL
    PID:1684

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nso3A84.tmp\System.dll

    Filesize

    10KB

    MD5

    2b54369538b0fb45e1bb9f49f71ce2db

    SHA1

    c20df42fda5854329e23826ba8f2015f506f7b92

    SHA256

    761dcdf12f41d119f49dbdca9bcab3928bbdfd8edd67e314d54689811f9d3e2f

    SHA512

    25e4898e3c082632dfd493756c4cc017decbef43ffa0b68f36d037841a33f2a1721f30314a85597ac30c7ecc99b7257ea43f3a903744179578a9c65fcf57a8b7

  • \Users\Admin\AppData\Local\Temp\nso3A84.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    c6284e23cd7e4d11db8298deb4541083

    SHA1

    e338686c7579620383ab8cc5a51bbb8d846f60cf

    SHA256

    79914940cbbf70a385f13a9970a9d577d7a7e07d240fe44563b45a472cd4bc3f

    SHA512

    72103e470d770fb402a18e975ff339526a3e4c9aeb8fac1b0977995a6eace0eca965b1915404df9b5a25b59628db1b199d2b9b10372841309c137054356a5cd7

  • memory/1684-54-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

    Filesize

    8KB