Analysis
-
max time kernel
189s -
max time network
229s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 15:16
Behavioral task
behavioral1
Sample
991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exe
Resource
win7-20221111-en
General
-
Target
991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exe
-
Size
201KB
-
MD5
30193e56b6b89ebb74635f72d4e6a854
-
SHA1
63022da3e2aae7fbb2a79a1269c991e372c0c1c0
-
SHA256
991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152
-
SHA512
7539ba938f69ac67b0fa043d6b7a9f4ec76f07c10c3dc8e7b59874ff562c2545e287a1c0457c7d74f8d449951143a439c3859ff54f38ff9a9b975512363726af
-
SSDEEP
3072:EDSXf2ro/JcXsFptLu3GIPkqu8J27A76NY36EZukoXVW4wFGmjZqMNeNV:EDef2roRc+1uFP9/J27A76OZZZvEV
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
neutraliprop.exepid process 936 neutraliprop.exe 936 neutraliprop.exe 936 neutraliprop.exe 936 neutraliprop.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exepid process 3784 991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exeneutraliprop.exedescription pid process target process PID 308 wrote to memory of 3784 308 991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exe 991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exe PID 308 wrote to memory of 3784 308 991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exe 991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exe PID 308 wrote to memory of 3784 308 991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exe 991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exe PID 4572 wrote to memory of 936 4572 neutraliprop.exe neutraliprop.exe PID 4572 wrote to memory of 936 4572 neutraliprop.exe neutraliprop.exe PID 4572 wrote to memory of 936 4572 neutraliprop.exe neutraliprop.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exe"C:\Users\Admin\AppData\Local\Temp\991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\991733473e2f2cd9f1e28f11d9429a27751a85ed1b805929aa2ad71b8e1b6152.exe--cd2aec662⤵
- Suspicious behavior: RenamesItself
-
C:\Windows\SysWOW64\neutraliprop.exe"C:\Windows\SysWOW64\neutraliprop.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\neutraliprop.exe--5747faf72⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/308-132-0x00000000007D0000-0x00000000007EB000-memory.dmpFilesize
108KB
-
memory/308-134-0x00000000007D0000-0x00000000007EB000-memory.dmpFilesize
108KB
-
memory/308-135-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/936-140-0x0000000000000000-mapping.dmp
-
memory/936-142-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/936-143-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/3784-133-0x0000000000000000-mapping.dmp
-
memory/3784-136-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/3784-137-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/3784-141-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/4572-138-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/4572-139-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB