Analysis

  • max time kernel
    159s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 00:46

General

  • Target

    91b184f3319f1b3f0449532d6843e61b4dda5e183ab41aef2a25af660756f454.exe

  • Size

    20.0MB

  • MD5

    1dbe02c53381e6f2e80a4eddd8b3e13d

  • SHA1

    c337206e540444420fe76e80e19acaad728f4978

  • SHA256

    91b184f3319f1b3f0449532d6843e61b4dda5e183ab41aef2a25af660756f454

  • SHA512

    ce4720f5c43e4f092eeb35b4995f7fdbed640624b0c4a1a823070ab8a19199ebefac0ba49a5dc6003ef1fff9093568432505ac342eaefb87127bf5a562d544d1

  • SSDEEP

    393216:YimdhqnnXYBzggCxYBgMaFgAFd3xiFV0Uh3WdVALzOF0L6JFOiPu6uX7qafpi:YimdhqnIBPCxYBwFg20b0Uh8MyS668uO

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91b184f3319f1b3f0449532d6843e61b4dda5e183ab41aef2a25af660756f454.exe
    "C:\Users\Admin\AppData\Local\Temp\91b184f3319f1b3f0449532d6843e61b4dda5e183ab41aef2a25af660756f454.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Users\Admin\AppData\Local\Temp\91b184f3319f1b3f0449532d6843e61b4dda5e183ab41aef2a25af660756f454.exe
      "C:\Users\Admin\AppData\Local\Temp\91b184f3319f1b3f0449532d6843e61b4dda5e183ab41aef2a25af660756f454.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\{A1E4E685-6F26-4BE3-8AF6-3095BAE7F3F7}.dll

    Filesize

    120KB

    MD5

    c9f333d1ff898672a34805f94a265329

    SHA1

    2deaac66698fb2e9b3868d23034c3211c508b739

    SHA256

    07e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b

    SHA512

    048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add

  • C:\Users\Admin\AppData\Local\Temp\{A1E4E685-6F26-4BE3-8AF6-3095BAE7F3F7}.dll

    Filesize

    120KB

    MD5

    c9f333d1ff898672a34805f94a265329

    SHA1

    2deaac66698fb2e9b3868d23034c3211c508b739

    SHA256

    07e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b

    SHA512

    048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add

  • memory/2012-133-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/2012-135-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/2012-134-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/2012-138-0x0000000004790000-0x00000000047EB000-memory.dmp

    Filesize

    364KB

  • memory/2012-139-0x0000000004790000-0x00000000047EB000-memory.dmp

    Filesize

    364KB

  • memory/2012-140-0x0000000004790000-0x00000000047EB000-memory.dmp

    Filesize

    364KB