Analysis

  • max time kernel
    42s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 22:36

General

  • Target

    78e3b115df400157e292c1bfd8e9e1ceab7bed04212349d29e28e0e17cb95b89.exe

  • Size

    245KB

  • MD5

    e005a61a0266c90d665a6ba6d4291204

  • SHA1

    40acbf11d86b34900994459a334855e0f1a79f6b

  • SHA256

    78e3b115df400157e292c1bfd8e9e1ceab7bed04212349d29e28e0e17cb95b89

  • SHA512

    3304e45f5f8f12f54c5f99e9c45a9d9426124a838c1c366848ef8e450d289639104c53091953cf3cb3426861d6df413a9f6b03b5e2b297d19155505020673f6e

  • SSDEEP

    6144:iZ58dVwgaXRlOavUbl5ll4DQFu/U3buRKlemZ9DnGAeo9XIsXakKmXzKatx:icdVLahLvUblrl4DQFu/U3buRKlemZ95

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78e3b115df400157e292c1bfd8e9e1ceab7bed04212349d29e28e0e17cb95b89.exe
    "C:\Users\Admin\AppData\Local\Temp\78e3b115df400157e292c1bfd8e9e1ceab7bed04212349d29e28e0e17cb95b89.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sedit.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sedit.exe"
      2⤵
      • Executes dropped EXE
      PID:1948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sedit.exe

    Filesize

    245KB

    MD5

    e005a61a0266c90d665a6ba6d4291204

    SHA1

    40acbf11d86b34900994459a334855e0f1a79f6b

    SHA256

    78e3b115df400157e292c1bfd8e9e1ceab7bed04212349d29e28e0e17cb95b89

    SHA512

    3304e45f5f8f12f54c5f99e9c45a9d9426124a838c1c366848ef8e450d289639104c53091953cf3cb3426861d6df413a9f6b03b5e2b297d19155505020673f6e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sedit.exe

    Filesize

    245KB

    MD5

    e005a61a0266c90d665a6ba6d4291204

    SHA1

    40acbf11d86b34900994459a334855e0f1a79f6b

    SHA256

    78e3b115df400157e292c1bfd8e9e1ceab7bed04212349d29e28e0e17cb95b89

    SHA512

    3304e45f5f8f12f54c5f99e9c45a9d9426124a838c1c366848ef8e450d289639104c53091953cf3cb3426861d6df413a9f6b03b5e2b297d19155505020673f6e

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sedit.exe

    Filesize

    245KB

    MD5

    e005a61a0266c90d665a6ba6d4291204

    SHA1

    40acbf11d86b34900994459a334855e0f1a79f6b

    SHA256

    78e3b115df400157e292c1bfd8e9e1ceab7bed04212349d29e28e0e17cb95b89

    SHA512

    3304e45f5f8f12f54c5f99e9c45a9d9426124a838c1c366848ef8e450d289639104c53091953cf3cb3426861d6df413a9f6b03b5e2b297d19155505020673f6e

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sedit.exe

    Filesize

    245KB

    MD5

    e005a61a0266c90d665a6ba6d4291204

    SHA1

    40acbf11d86b34900994459a334855e0f1a79f6b

    SHA256

    78e3b115df400157e292c1bfd8e9e1ceab7bed04212349d29e28e0e17cb95b89

    SHA512

    3304e45f5f8f12f54c5f99e9c45a9d9426124a838c1c366848ef8e450d289639104c53091953cf3cb3426861d6df413a9f6b03b5e2b297d19155505020673f6e

  • memory/1184-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

    Filesize

    8KB