Analysis

  • max time kernel
    104s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 15:28

General

  • Target

    0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe

  • Size

    2.1MB

  • MD5

    3fb3f6f3ac528a2729fcc288a3674068

  • SHA1

    15d562d30ace9c69a92ad7dc8a4d45a9dd2c18c8

  • SHA256

    0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2

  • SHA512

    d36f54dca40d4f32ae1551fda9db10f3bde7305033c4d97a1081f896914c98deef800a50114346d83d9e59e2d8c8f2d38e5d18f36ed278ef0627a7440fa5a933

  • SSDEEP

    49152:j8H6V5OX2DvztsG7pkGf9pO7psF6E3ly1JOQZja80CPeK:aC/jzt97pxFpO7psgE3lwRtac

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe
    "C:\Users\Admin\AppData\Local\Temp\0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\btengine_Setup.exe
        C:\Users\Admin\AppData\Local\Temp\RarSFX0\btengine_Setup.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:572

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\GTemp.dat

    Filesize

    671KB

    MD5

    19de4d67776c77ef4f86908cbf21d7c7

    SHA1

    757c02d9aa75b5d843d28cac05ba817b375c4d20

    SHA256

    b7028e72aae01418da32fcfc511fdb3acd1721a4a6cf95a0ba7cc72cbee8265b

    SHA512

    46b3814a826beb8b645d660f4e22fce2ba68b757b11b9f2e886683bee852d80034d066cea8f1cda1d505f37b3d46eeeee4e3fa1e169167942be85d40e39efea1

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.EXE

    Filesize

    735KB

    MD5

    7d840408d414e22e3c57b748a3a06783

    SHA1

    fd73cdf210485568451315868a288a1ddd63fcf8

    SHA256

    41e358277613d25758614b7b12c26660e43e5282974b88a4b0694c8a98013145

    SHA512

    d90121c1acc1eea6e354962ed33562514279e221e5ec6f2890cd1dc07982256b0a00da1bf39f8cb688e39a91afccd8f36035f59e62d30a40ea934f40226ef57e

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe

    Filesize

    735KB

    MD5

    7d840408d414e22e3c57b748a3a06783

    SHA1

    fd73cdf210485568451315868a288a1ddd63fcf8

    SHA256

    41e358277613d25758614b7b12c26660e43e5282974b88a4b0694c8a98013145

    SHA512

    d90121c1acc1eea6e354962ed33562514279e221e5ec6f2890cd1dc07982256b0a00da1bf39f8cb688e39a91afccd8f36035f59e62d30a40ea934f40226ef57e

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\btengine_Setup.exe

    Filesize

    671KB

    MD5

    19de4d67776c77ef4f86908cbf21d7c7

    SHA1

    757c02d9aa75b5d843d28cac05ba817b375c4d20

    SHA256

    b7028e72aae01418da32fcfc511fdb3acd1721a4a6cf95a0ba7cc72cbee8265b

    SHA512

    46b3814a826beb8b645d660f4e22fce2ba68b757b11b9f2e886683bee852d80034d066cea8f1cda1d505f37b3d46eeeee4e3fa1e169167942be85d40e39efea1

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.ini

    Filesize

    214B

    MD5

    8c880f6ed4a1209da3a16640cdd850cc

    SHA1

    a2cb21803945d6a479e460a0a4c5f64ffa76953c

    SHA256

    73fd501dd52ccd9301bf59ea34c4e67ebdbda642fb620c36cd4431cd8643503d

    SHA512

    d81ead604f31bd6a0e01432f1962faa635708b126557ab5e6e03252d7eb982175e26482e3c559953a85b014eb099097dd1a4fa6fe8052e00282a2b0d475fc9fc

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Setup.EXE

    Filesize

    735KB

    MD5

    7d840408d414e22e3c57b748a3a06783

    SHA1

    fd73cdf210485568451315868a288a1ddd63fcf8

    SHA256

    41e358277613d25758614b7b12c26660e43e5282974b88a4b0694c8a98013145

    SHA512

    d90121c1acc1eea6e354962ed33562514279e221e5ec6f2890cd1dc07982256b0a00da1bf39f8cb688e39a91afccd8f36035f59e62d30a40ea934f40226ef57e

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Setup.EXE

    Filesize

    735KB

    MD5

    7d840408d414e22e3c57b748a3a06783

    SHA1

    fd73cdf210485568451315868a288a1ddd63fcf8

    SHA256

    41e358277613d25758614b7b12c26660e43e5282974b88a4b0694c8a98013145

    SHA512

    d90121c1acc1eea6e354962ed33562514279e221e5ec6f2890cd1dc07982256b0a00da1bf39f8cb688e39a91afccd8f36035f59e62d30a40ea934f40226ef57e

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Setup.EXE

    Filesize

    735KB

    MD5

    7d840408d414e22e3c57b748a3a06783

    SHA1

    fd73cdf210485568451315868a288a1ddd63fcf8

    SHA256

    41e358277613d25758614b7b12c26660e43e5282974b88a4b0694c8a98013145

    SHA512

    d90121c1acc1eea6e354962ed33562514279e221e5ec6f2890cd1dc07982256b0a00da1bf39f8cb688e39a91afccd8f36035f59e62d30a40ea934f40226ef57e

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Setup.EXE

    Filesize

    735KB

    MD5

    7d840408d414e22e3c57b748a3a06783

    SHA1

    fd73cdf210485568451315868a288a1ddd63fcf8

    SHA256

    41e358277613d25758614b7b12c26660e43e5282974b88a4b0694c8a98013145

    SHA512

    d90121c1acc1eea6e354962ed33562514279e221e5ec6f2890cd1dc07982256b0a00da1bf39f8cb688e39a91afccd8f36035f59e62d30a40ea934f40226ef57e

  • \Users\Admin\AppData\Local\Temp\RarSFX0\btengine_Setup.exe

    Filesize

    671KB

    MD5

    19de4d67776c77ef4f86908cbf21d7c7

    SHA1

    757c02d9aa75b5d843d28cac05ba817b375c4d20

    SHA256

    b7028e72aae01418da32fcfc511fdb3acd1721a4a6cf95a0ba7cc72cbee8265b

    SHA512

    46b3814a826beb8b645d660f4e22fce2ba68b757b11b9f2e886683bee852d80034d066cea8f1cda1d505f37b3d46eeeee4e3fa1e169167942be85d40e39efea1

  • \Users\Admin\AppData\Local\Temp\RarSFX0\btengine_Setup.exe

    Filesize

    671KB

    MD5

    19de4d67776c77ef4f86908cbf21d7c7

    SHA1

    757c02d9aa75b5d843d28cac05ba817b375c4d20

    SHA256

    b7028e72aae01418da32fcfc511fdb3acd1721a4a6cf95a0ba7cc72cbee8265b

    SHA512

    46b3814a826beb8b645d660f4e22fce2ba68b757b11b9f2e886683bee852d80034d066cea8f1cda1d505f37b3d46eeeee4e3fa1e169167942be85d40e39efea1

  • \Users\Admin\AppData\Local\Temp\RarSFX0\btengine_Setup.exe

    Filesize

    671KB

    MD5

    19de4d67776c77ef4f86908cbf21d7c7

    SHA1

    757c02d9aa75b5d843d28cac05ba817b375c4d20

    SHA256

    b7028e72aae01418da32fcfc511fdb3acd1721a4a6cf95a0ba7cc72cbee8265b

    SHA512

    46b3814a826beb8b645d660f4e22fce2ba68b757b11b9f2e886683bee852d80034d066cea8f1cda1d505f37b3d46eeeee4e3fa1e169167942be85d40e39efea1

  • \Users\Admin\AppData\Local\Temp\RarSFX0\btengine_Setup.exe

    Filesize

    671KB

    MD5

    19de4d67776c77ef4f86908cbf21d7c7

    SHA1

    757c02d9aa75b5d843d28cac05ba817b375c4d20

    SHA256

    b7028e72aae01418da32fcfc511fdb3acd1721a4a6cf95a0ba7cc72cbee8265b

    SHA512

    46b3814a826beb8b645d660f4e22fce2ba68b757b11b9f2e886683bee852d80034d066cea8f1cda1d505f37b3d46eeeee4e3fa1e169167942be85d40e39efea1

  • memory/572-73-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/572-74-0x0000000000240000-0x0000000000264000-memory.dmp

    Filesize

    144KB

  • memory/1612-54-0x0000000075C81000-0x0000000075C83000-memory.dmp

    Filesize

    8KB

  • memory/1752-72-0x00000000003A0000-0x00000000003C4000-memory.dmp

    Filesize

    144KB

  • memory/1752-84-0x00000000003A0000-0x00000000003C4000-memory.dmp

    Filesize

    144KB