Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 11:48

General

  • Target

    9e866e6389c9d36f943f9cb9c7d86f1b6f332dc4e12cccf24a40597df4ca9b11.exe

  • Size

    274KB

  • MD5

    aa56e5691d75776e68b6b2f860eb3cca

  • SHA1

    11cf6535b217e2f73e0433fdadcdfd3ef0923513

  • SHA256

    9e866e6389c9d36f943f9cb9c7d86f1b6f332dc4e12cccf24a40597df4ca9b11

  • SHA512

    3c84ca5fcb6fb3313d6c332af788a8277a4c71526a3ec75c32539434798af0802af94b999cbdbcdcebaf2acc485ea95728e2fee5ee6f84f6f7e8380dca42d89e

  • SSDEEP

    6144:ysaocyLC0cZIgFtJzNhXgDh82eRmHPyIgYSjsJ+LjMdkly2hD:ytobLEJzNVgsRgsYYvMCEo

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e866e6389c9d36f943f9cb9c7d86f1b6f332dc4e12cccf24a40597df4ca9b11.exe
    "C:\Users\Admin\AppData\Local\Temp\9e866e6389c9d36f943f9cb9c7d86f1b6f332dc4e12cccf24a40597df4ca9b11.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:556
    • C:\Users\Admin\AppData\Local\Temp\nsyEDEA.tmp\installer.exe
      C:\Users\Admin\AppData\Local\Temp\nsyEDEA.tmp\installer.exe 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe /t /dT131921401S /e5818302 /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Users\Admin\AppData\Local\Temp\nsyEDEA.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe
        "C:\Users\Admin\AppData\Local\Temp\nsyEDEA.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe" /t /dT131921401S /e5818302 /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1232

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\12236C41CDDF9E40BA5606CDF086B821

    Filesize

    187KB

    MD5

    083feab61addd734717def76d637514d

    SHA1

    0636590e2c1df877041d2c263313bbd546b98b38

    SHA256

    89e8544f9890df0fa65cb886264bb743dc088e71f8f6cda2835a41b8683aaf79

    SHA512

    9255f0281c83835908446e0101b2e4737fc0b799eb089cdbd116ed0af335e5e9186fb0355082a2dbf14a9f5c19fcced7e7b668b67f13bf97d644f6487ddbc23b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    604B

    MD5

    e7ed9b0571e14a4824cebee137d9bcd1

    SHA1

    59d9a27a741aee4bfc0605a287a88782cdafe6ff

    SHA256

    62f9b298a1f9e62f29c486f9cd2731a28302b9215656fd8b1c7c0071071b25ad

    SHA512

    6f6f379a5fbce3afbfb29b159bfe784ecf4b42672c5bc441e89383c54ccd210766388526748c48f9889cfdd5e126054a8d67971d69c46f37bb117e515ad9d400

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\12236C41CDDF9E40BA5606CDF086B821

    Filesize

    202B

    MD5

    580363b17fb9a2d531e0569d8b481615

    SHA1

    ebd8b23f4d31ace1c8e3528ef51410d456014202

    SHA256

    495758b375db2c70b7814e2dc359826a698f1184efce4bbfc8b19c3bc627a232

    SHA512

    947b7aea5d308a884313733e32cdacd2b840d47a903e14bf77611d7fa6df7f6921289caae5bd82f1e015e4e20a737cfda6ea6492fe5a46212ff7b47c544911d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    188B

    MD5

    9da836179a0bcbe19435cbaec720ae9d

    SHA1

    698d6aeb4f760deb0eba68911d993b1c0051f175

    SHA256

    4f408857b8ec121e2c129c6a3aca90dde8886d0a48dd242bc96ce2a7d3eaa351

    SHA512

    73af8d32b2de3b20865a150a0b31674f1d6f7048df33fc8a85e6dd7c7c4f5f729d27cde394ec425be172d4d8eb8136531eff5ca073f14cd9acdcc3b0fa6fedd3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    85cdc6077cac89ec38407ddec6ae977f

    SHA1

    a71fba9cb588fc3e6bf7ec07df343436d353459a

    SHA256

    9aff9016378f7502d35cdcf2525a0a0450fb361c4c93134b2f9af2c3fdcb3f81

    SHA512

    2154c5e17cc504cb0c702b657b1fd4800b62cc3636b2d7941166c674de0ab94849a2157fef699400062a7d6b4d4848be41407b8e624303fd1e23f05525d517bd

  • C:\Users\Admin\AppData\Local\Temp\nsyEDEA.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe

    Filesize

    256KB

    MD5

    6e68cf541f031c7de9da6ec8d86862aa

    SHA1

    115f143b5f585a27006159dc1b2d4d23a7af5295

    SHA256

    d1763b911eebce060a4c479190e83ff5747f5e75f938fb1cb23d5fcaba249e35

    SHA512

    022af872f2343293a0d71c6cc3ca3f13001ce7ad8e04cf740b75574272cad1dcb40a97a0e860082e7080a69a0367438728f1983317349d5a33ca969c3d877de1

  • C:\Users\Admin\AppData\Local\Temp\nsyEDEA.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe

    Filesize

    256KB

    MD5

    6e68cf541f031c7de9da6ec8d86862aa

    SHA1

    115f143b5f585a27006159dc1b2d4d23a7af5295

    SHA256

    d1763b911eebce060a4c479190e83ff5747f5e75f938fb1cb23d5fcaba249e35

    SHA512

    022af872f2343293a0d71c6cc3ca3f13001ce7ad8e04cf740b75574272cad1dcb40a97a0e860082e7080a69a0367438728f1983317349d5a33ca969c3d877de1

  • C:\Users\Admin\AppData\Local\Temp\nsyEDEA.tmp\installer.exe

    Filesize

    214KB

    MD5

    7cf3bce5ecf2aea97b49e2eba8ca0aba

    SHA1

    543f5fc23df08f946488d27b2fb16b13b6311d1a

    SHA256

    7358afae03a24b31c0d82ee4e5fd2f17cafe6c3bdd8e26326aa4118f2169f736

    SHA512

    5f9184189940af27e25ae2988db8d15923dac81b2410c5fe3287f126fb50df43735fccb4e4d9f376e9f24700604c157aa1828622dab54014d9583a56ab698d8d

  • C:\Users\Admin\AppData\Local\Temp\nsyEDEA.tmp\installer.exe

    Filesize

    214KB

    MD5

    7cf3bce5ecf2aea97b49e2eba8ca0aba

    SHA1

    543f5fc23df08f946488d27b2fb16b13b6311d1a

    SHA256

    7358afae03a24b31c0d82ee4e5fd2f17cafe6c3bdd8e26326aa4118f2169f736

    SHA512

    5f9184189940af27e25ae2988db8d15923dac81b2410c5fe3287f126fb50df43735fccb4e4d9f376e9f24700604c157aa1828622dab54014d9583a56ab698d8d

  • \Users\Admin\AppData\Local\Temp\nsyEDEA.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe

    Filesize

    256KB

    MD5

    6e68cf541f031c7de9da6ec8d86862aa

    SHA1

    115f143b5f585a27006159dc1b2d4d23a7af5295

    SHA256

    d1763b911eebce060a4c479190e83ff5747f5e75f938fb1cb23d5fcaba249e35

    SHA512

    022af872f2343293a0d71c6cc3ca3f13001ce7ad8e04cf740b75574272cad1dcb40a97a0e860082e7080a69a0367438728f1983317349d5a33ca969c3d877de1

  • \Users\Admin\AppData\Local\Temp\nsyEDEA.tmp\installer.exe

    Filesize

    214KB

    MD5

    7cf3bce5ecf2aea97b49e2eba8ca0aba

    SHA1

    543f5fc23df08f946488d27b2fb16b13b6311d1a

    SHA256

    7358afae03a24b31c0d82ee4e5fd2f17cafe6c3bdd8e26326aa4118f2169f736

    SHA512

    5f9184189940af27e25ae2988db8d15923dac81b2410c5fe3287f126fb50df43735fccb4e4d9f376e9f24700604c157aa1828622dab54014d9583a56ab698d8d

  • \Users\Admin\AppData\Local\Temp\nsyEDEA.tmp\nsExec.dll

    Filesize

    8KB

    MD5

    249ae678f0dac4c625c6de6aca53823a

    SHA1

    6ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201

    SHA256

    7298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce

    SHA512

    66e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7

  • memory/556-54-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

    Filesize

    8KB

  • memory/1232-76-0x0000000073FB0000-0x000000007455B000-memory.dmp

    Filesize

    5.7MB

  • memory/1232-63-0x0000000000000000-mapping.dmp

  • memory/1232-77-0x0000000002109000-0x000000000211A000-memory.dmp

    Filesize

    68KB

  • memory/1232-73-0x0000000073FB0000-0x000000007455B000-memory.dmp

    Filesize

    5.7MB

  • memory/1232-74-0x0000000002109000-0x000000000211A000-memory.dmp

    Filesize

    68KB

  • memory/1232-75-0x0000000073FB0000-0x000000007455B000-memory.dmp

    Filesize

    5.7MB

  • memory/1912-61-0x0000000073FB0000-0x000000007455B000-memory.dmp

    Filesize

    5.7MB

  • memory/1912-57-0x0000000000000000-mapping.dmp

  • memory/1912-78-0x0000000073FB0000-0x000000007455B000-memory.dmp

    Filesize

    5.7MB