Analysis

  • max time kernel
    168s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 22:32

General

  • Target

    7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995.exe

  • Size

    104KB

  • MD5

    20929196f554c649d332980f24692ef7

  • SHA1

    44c9f272a74794f1d1b27a7476fd79e5ec9fdc10

  • SHA256

    7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995

  • SHA512

    8dbc7fb467749f79a4191c8bb24950232905b4f22b8faab5b87a268cea7df307f6cd39a8011301bfcd4ed820bc2f32270f039e36a19e5b4bbdef9993229405fb

  • SSDEEP

    3072:jE+HkRVn3fjKuaujqJ0geyhc4N73lTpU:zkXK6O0dyT7

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 1 IoCs
  • Modifies Windows Firewall 1 TTPs 5 IoCs
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995.exe
    "C:\Users\Admin\AppData\Local\Temp\7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995.exe"
    1⤵
    • Modifies firewall policy service
    • Drops startup file
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995.exe"
      2⤵
      • Modifies Windows Firewall
      PID:1052
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995.exe"
      2⤵
      • Modifies Windows Firewall
      PID:528
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995.exe"
      2⤵
      • Modifies Windows Firewall
      PID:1104
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995.exe"
      2⤵
      • Modifies Windows Firewall
      PID:1924
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\7a7109fbc1c67f808e7e3e40cfdc18646063e1762a5edaec94c6a03dd907c995.exe"
      2⤵
      • Modifies Windows Firewall
      PID:320

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1792-54-0x00000000760A1000-0x00000000760A3000-memory.dmp

          Filesize

          8KB

        • memory/1792-55-0x0000000000520000-0x000000000053D000-memory.dmp

          Filesize

          116KB

        • memory/1792-56-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1792-57-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB