Analysis

  • max time kernel
    145s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 22:51

General

  • Target

    743ce99e51d01a9502c43046f9cca58e902be9c6cab5cf4cb0f56586d5c386ee.exe

  • Size

    64KB

  • MD5

    a42838fc524b25bd1a4a0d5cc97d4680

  • SHA1

    ca45a112cd0c89a4f2e5ac2e8eba557ad596ad0a

  • SHA256

    743ce99e51d01a9502c43046f9cca58e902be9c6cab5cf4cb0f56586d5c386ee

  • SHA512

    109c3b4a0b6632184a1bc8d88b5959fc435ab7cbd140f3964cd4280c239bb46c3de3ce8c007012a2200d220453437cb6d7142de67d8bd1a1e51f043c2f46eedc

  • SSDEEP

    1536:VHHIcz+j0W2QA5v974JyZuCWPcJzjX6lYd:VIi+jV2n7WyZuCWiq6d

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 46 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\743ce99e51d01a9502c43046f9cca58e902be9c6cab5cf4cb0f56586d5c386ee.exe
    "C:\Users\Admin\AppData\Local\Temp\743ce99e51d01a9502c43046f9cca58e902be9c6cab5cf4cb0f56586d5c386ee.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Windows\ZAYUOZBIDUJF.dll"
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:932
    • C:\Users\Admin\AppData\Local\Temp\GrillScandal.exe
      "C:\Users\Admin\AppData\Local\Temp\GrillScandal.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:1464
    • C:\Users\Admin\AppData\Local\Temp\GrillScandal.exe
      C:\Users\Admin\AppData\Local\Temp\GrillScandal.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:1332

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GrillScandal.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • C:\Users\Admin\AppData\Local\Temp\GrillScandal.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • C:\Windows\ZAYUOZBIDUJF.dll

    Filesize

    96KB

    MD5

    5e96c83c664b3ff94439f8e452f25cf4

    SHA1

    c3c74c9a2008d588b628dcf289415a4664b9f54d

    SHA256

    1f9ae11065e3834d0990f7eeed25904b0f5663d1033411bd8257edaa3c8e189d

    SHA512

    7206dcdc337288ab1f6fb4f508a729c198e970abe5f26b8f9c74cffef9ef79d96f4fcc57b1f1b6886ec388ff513e6be1d2584824ef232cd0fb47ce73d7564bfa

  • \Program Files\HarridanTaper\KnockerLevitate.exe

    Filesize

    64KB

    MD5

    a42838fc524b25bd1a4a0d5cc97d4680

    SHA1

    ca45a112cd0c89a4f2e5ac2e8eba557ad596ad0a

    SHA256

    743ce99e51d01a9502c43046f9cca58e902be9c6cab5cf4cb0f56586d5c386ee

    SHA512

    109c3b4a0b6632184a1bc8d88b5959fc435ab7cbd140f3964cd4280c239bb46c3de3ce8c007012a2200d220453437cb6d7142de67d8bd1a1e51f043c2f46eedc

  • \Program Files\KnockerHarridan\FlexPageant.exe

    Filesize

    64KB

    MD5

    a42838fc524b25bd1a4a0d5cc97d4680

    SHA1

    ca45a112cd0c89a4f2e5ac2e8eba557ad596ad0a

    SHA256

    743ce99e51d01a9502c43046f9cca58e902be9c6cab5cf4cb0f56586d5c386ee

    SHA512

    109c3b4a0b6632184a1bc8d88b5959fc435ab7cbd140f3964cd4280c239bb46c3de3ce8c007012a2200d220453437cb6d7142de67d8bd1a1e51f043c2f46eedc

  • \Users\Admin\AppData\Local\Temp\GrillScandal.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • \Users\Admin\AppData\Local\Temp\GrillScandal.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • \Users\Admin\AppData\Local\Temp\GrillScandal.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • \Users\Admin\AppData\Local\Temp\GrillScandal.exe

    Filesize

    28KB

    MD5

    6697555ead62e6b9fb71a0ffb6d62992

    SHA1

    55b57b52fe0d4af8716db57a98ab011b1dbe4181

    SHA256

    683a7e3bc4e63ba70bf88c23ae895109d19fc02c9d084ddd759a5569b56d2cd6

    SHA512

    36b7c24cbc5cef1ea6cca65c2054e3baae7096932bbb2caa4857d4f324407fe5a92e610d7baf979dfa881d82f9c99c74037b774967cd5d31af5a120bd9eefdf8

  • memory/1812-54-0x0000000076411000-0x0000000076413000-memory.dmp

    Filesize

    8KB

  • memory/1812-55-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1812-71-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB