Analysis

  • max time kernel
    106s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    30/11/2022, 23:01

General

  • Target

    b39da0cd3206a02bf2bcd70a47a4241580b370b6b3ad11b4aa021698211cb566.exe

  • Size

    2.0MB

  • MD5

    a8deb34083e0081b2be0f8d0302c2fee

  • SHA1

    5f3711e79dea8eee27aa6219d43538ba92ea239f

  • SHA256

    b39da0cd3206a02bf2bcd70a47a4241580b370b6b3ad11b4aa021698211cb566

  • SHA512

    de98285d4cc700b7f0beca77db20f0455921bf5d0a66e3f3182ce450dc4bfbd48a1b824837775112d1cd33e2a977b2a873d5023547d1dee6051389ddf4a938af

  • SSDEEP

    49152:EugmQtZrtFTjpXdbhljDasY6DwOBfrnvV7UeWt2bExrl5VeS:EugPrTFd9YiwOBpIeW9rlXeS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b39da0cd3206a02bf2bcd70a47a4241580b370b6b3ad11b4aa021698211cb566.exe
    "C:\Users\Admin\AppData\Local\Temp\b39da0cd3206a02bf2bcd70a47a4241580b370b6b3ad11b4aa021698211cb566.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Users\Admin\AppData\Local\Temp\0msgxpz1.rl3\b39da0cd3206a02bf2bcd70a47a4241580b370b6b3ad11b4aa021698211cb566.exe
      "C:\Users\Admin\AppData\Local\Temp\0msgxpz1.rl3\b39da0cd3206a02bf2bcd70a47a4241580b370b6b3ad11b4aa021698211cb566.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0msgxpz1.rl3\b39da0cd3206a02bf2bcd70a47a4241580b370b6b3ad11b4aa021698211cb566.exe

    Filesize

    1.9MB

    MD5

    246ac92cb679b49df3a389156378d899

    SHA1

    64f43409ca96e44c0d2a84886419ba4450d4cdce

    SHA256

    93bfacd6307e39bbabfbeff3d73d570fd689dbcfed02b5099991ccc204662716

    SHA512

    8092163654adbe735f7c13c82a536926c7daeae389887a60cee35f344ab8f4473717c03ee35f80e4d39ce510bcec0bc83444b5b2f2de1346585edb4fcf35b7c5

  • C:\Users\Admin\AppData\Local\Temp\0msgxpz1.rl3\b39da0cd3206a02bf2bcd70a47a4241580b370b6b3ad11b4aa021698211cb566.exe

    Filesize

    1.9MB

    MD5

    246ac92cb679b49df3a389156378d899

    SHA1

    64f43409ca96e44c0d2a84886419ba4450d4cdce

    SHA256

    93bfacd6307e39bbabfbeff3d73d570fd689dbcfed02b5099991ccc204662716

    SHA512

    8092163654adbe735f7c13c82a536926c7daeae389887a60cee35f344ab8f4473717c03ee35f80e4d39ce510bcec0bc83444b5b2f2de1346585edb4fcf35b7c5

  • \Users\Admin\AppData\Local\Temp\0msgxpz1.rl3\7z.dll

    Filesize

    893KB

    MD5

    04ad4b80880b32c94be8d0886482c774

    SHA1

    344faf61c3eb76f4a2fb6452e83ed16c9cce73e0

    SHA256

    a1e1d1f0fff4fcccfbdfa313f3bdfea4d3dfe2c2d9174a615bbc39a0a6929338

    SHA512

    3e3aaf01b769471b18126e443a721c9e9a0269e9f5e48d0a10251bc1ee309855bd71ede266caa6828b007359b21ba562c2a5a3469078760f564fb7bd43acabfb

  • \Users\Admin\AppData\Local\Temp\0msgxpz1.rl3\b39da0cd3206a02bf2bcd70a47a4241580b370b6b3ad11b4aa021698211cb566.exe

    Filesize

    1.9MB

    MD5

    246ac92cb679b49df3a389156378d899

    SHA1

    64f43409ca96e44c0d2a84886419ba4450d4cdce

    SHA256

    93bfacd6307e39bbabfbeff3d73d570fd689dbcfed02b5099991ccc204662716

    SHA512

    8092163654adbe735f7c13c82a536926c7daeae389887a60cee35f344ab8f4473717c03ee35f80e4d39ce510bcec0bc83444b5b2f2de1346585edb4fcf35b7c5

  • memory/960-54-0x0000000075761000-0x0000000075763000-memory.dmp

    Filesize

    8KB

  • memory/960-55-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB

  • memory/960-56-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB

  • memory/960-60-0x00000000012E0000-0x00000000013D0000-memory.dmp

    Filesize

    960KB

  • memory/960-65-0x0000000074AB0000-0x000000007505B000-memory.dmp

    Filesize

    5.7MB

  • memory/1552-80-0x00000000772F0000-0x000000007744C000-memory.dmp

    Filesize

    1.4MB

  • memory/1552-86-0x0000000064E70000-0x0000000065142000-memory.dmp

    Filesize

    2.8MB

  • memory/1552-64-0x00000000750F0000-0x000000007513A000-memory.dmp

    Filesize

    296KB

  • memory/1552-66-0x00000000008D0000-0x00000000009C0000-memory.dmp

    Filesize

    960KB

  • memory/1552-69-0x0000000000100000-0x000000000013E000-memory.dmp

    Filesize

    248KB

  • memory/1552-70-0x00000000008D0000-0x00000000009C0000-memory.dmp

    Filesize

    960KB

  • memory/1552-71-0x00000000008D0000-0x00000000009C0000-memory.dmp

    Filesize

    960KB

  • memory/1552-68-0x00000000768C0000-0x000000007696C000-memory.dmp

    Filesize

    688KB

  • memory/1552-72-0x0000000076D20000-0x0000000076D67000-memory.dmp

    Filesize

    284KB

  • memory/1552-73-0x0000000076490000-0x00000000764E7000-memory.dmp

    Filesize

    348KB

  • memory/1552-74-0x00000000750E0000-0x00000000750E9000-memory.dmp

    Filesize

    36KB

  • memory/1552-75-0x0000000074A40000-0x0000000074FEB000-memory.dmp

    Filesize

    5.7MB

  • memory/1552-78-0x0000000074A40000-0x0000000074FEB000-memory.dmp

    Filesize

    5.7MB

  • memory/1552-77-0x0000000076D20000-0x0000000076D67000-memory.dmp

    Filesize

    284KB

  • memory/1552-76-0x0000000075760000-0x00000000763AA000-memory.dmp

    Filesize

    12.3MB

  • memory/1552-81-0x0000000075070000-0x00000000750CB000-memory.dmp

    Filesize

    364KB

  • memory/1552-82-0x00000000772F0000-0x000000007744C000-memory.dmp

    Filesize

    1.4MB

  • memory/1552-83-0x0000000060340000-0x0000000060348000-memory.dmp

    Filesize

    32KB

  • memory/1552-84-0x0000000076B70000-0x0000000076BA5000-memory.dmp

    Filesize

    212KB

  • memory/1552-85-0x00000000771D0000-0x00000000772ED000-memory.dmp

    Filesize

    1.1MB

  • memory/1552-61-0x00000000008D0000-0x00000000009C0000-memory.dmp

    Filesize

    960KB

  • memory/1552-89-0x00000000766C0000-0x000000007674F000-memory.dmp

    Filesize

    572KB

  • memory/1552-90-0x0000000073D00000-0x0000000073D17000-memory.dmp

    Filesize

    92KB

  • memory/1552-91-0x00000000008D0000-0x00000000009C0000-memory.dmp

    Filesize

    960KB

  • memory/1552-92-0x0000000073260000-0x0000000073275000-memory.dmp

    Filesize

    84KB

  • memory/1552-93-0x0000000073280000-0x00000000732D2000-memory.dmp

    Filesize

    328KB

  • memory/1552-94-0x0000000073DB0000-0x0000000073DBD000-memory.dmp

    Filesize

    52KB

  • memory/1552-95-0x0000000077110000-0x0000000077129000-memory.dmp

    Filesize

    100KB

  • memory/1552-96-0x0000000072640000-0x000000007268F000-memory.dmp

    Filesize

    316KB

  • memory/1552-97-0x0000000072690000-0x00000000726E8000-memory.dmp

    Filesize

    352KB

  • memory/1552-98-0x0000000072620000-0x000000007263C000-memory.dmp

    Filesize

    112KB

  • memory/1552-99-0x00000000752F0000-0x00000000752FC000-memory.dmp

    Filesize

    48KB

  • memory/1552-101-0x0000000076D70000-0x0000000076D97000-memory.dmp

    Filesize

    156KB

  • memory/1552-102-0x0000000076D20000-0x0000000076D67000-memory.dmp

    Filesize

    284KB

  • memory/1552-103-0x0000000074A40000-0x0000000074FEB000-memory.dmp

    Filesize

    5.7MB

  • memory/1552-104-0x00000000772F0000-0x000000007744C000-memory.dmp

    Filesize

    1.4MB

  • memory/1552-105-0x0000000060340000-0x0000000060348000-memory.dmp

    Filesize

    32KB

  • memory/1552-106-0x0000000072450000-0x00000000725E0000-memory.dmp

    Filesize

    1.6MB

  • memory/1552-107-0x00000000723E0000-0x000000007243F000-memory.dmp

    Filesize

    380KB

  • memory/1552-108-0x00000000723B0000-0x00000000723C3000-memory.dmp

    Filesize

    76KB