Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 11:42

General

  • Target

    d5b3c50b0f39ecc9baaadc33a220973677b35675df377513d9b6ff923213024e.exe

  • Size

    6.5MB

  • MD5

    d8440bd36abb5da6dacff6562e9c9140

  • SHA1

    c0642d17d94b4f4fcef18a4ed8a2e01e0572e8f8

  • SHA256

    d5b3c50b0f39ecc9baaadc33a220973677b35675df377513d9b6ff923213024e

  • SHA512

    d648ff0d34ad922d724e34f9769cd4e14680931a4d459f3230a5ed345bde64675f35f933775f696078b0a6e8fa374ef30daa6a7ca2dc8e0e654c994ff98e9f78

  • SSDEEP

    196608:qNogPC2hCKwatk3+nv0OcW6xHZ9ikT//Sf5h7i1zwK:qW4VMatkOnv0NH/ikz8yNwK

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5b3c50b0f39ecc9baaadc33a220973677b35675df377513d9b6ff923213024e.exe
    "C:\Users\Admin\AppData\Local\Temp\d5b3c50b0f39ecc9baaadc33a220973677b35675df377513d9b6ff923213024e.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1516

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\h2uoiyeq.4np\7z.dll

          Filesize

          893KB

          MD5

          04ad4b80880b32c94be8d0886482c774

          SHA1

          344faf61c3eb76f4a2fb6452e83ed16c9cce73e0

          SHA256

          a1e1d1f0fff4fcccfbdfa313f3bdfea4d3dfe2c2d9174a615bbc39a0a6929338

          SHA512

          3e3aaf01b769471b18126e443a721c9e9a0269e9f5e48d0a10251bc1ee309855bd71ede266caa6828b007359b21ba562c2a5a3469078760f564fb7bd43acabfb

        • memory/1516-54-0x0000000075111000-0x0000000075113000-memory.dmp

          Filesize

          8KB

        • memory/1516-55-0x0000000074170000-0x000000007471B000-memory.dmp

          Filesize

          5.7MB

        • memory/1516-57-0x0000000001F4A000-0x0000000001F5B000-memory.dmp

          Filesize

          68KB

        • memory/1516-58-0x0000000074170000-0x000000007471B000-memory.dmp

          Filesize

          5.7MB