Analysis

  • max time kernel
    191s
  • max time network
    207s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 03:13

General

  • Target

    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe

  • Size

    152KB

  • MD5

    f432a89d4ba2e6aa2975335f3a57da1b

  • SHA1

    815689ebd707d7e55fd35815958db05c923b590c

  • SHA256

    7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a

  • SHA512

    c7dba55980d6a3ee5871ec9a50227f7e92e8f2bd4a74d25d15ae76f0110f437ac215fe3ec25921b6f2b0167ca044d5a35835477756c2dae86344b32844a81905

  • SSDEEP

    3072:yIl0QiGEomaClFmwbcDRMjEBZ4v9xDx71yHVJA/ndH5:uJG2rv3cGBvHV7Wknd

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
    "C:\Users\Admin\AppData\Local\Temp\7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\SysWOW64\regedt32.exe
      "C:\Windows\System32\regedt32.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:900
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\regedit.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"
        3⤵
        • Runs .reg file with regedit
        PID:364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\Iterra\T03emp03.reg

    Filesize

    217B

    MD5

    84254df6df9b919aa7236aebea5b4132

    SHA1

    14071ad10ecb853c3f29118317f710b2b0aced9b

    SHA256

    61b29858d488a0e74f75875ebef1c21159771a10e52f268f443132b919cfe593

    SHA512

    19e08e611ea968f040019d698f984cbb9c17e6eb83d80930a8f95dde0fd0d6217ac04f96bc4e265dc316289359ef47f01fce0ad69ca3dff535c540e6094175ee

  • \Users\Admin\Documents\Iterra\kkvwfrj.dll

    Filesize

    41KB

    MD5

    3fd996d73950eeb6edfa0a2f6589fd89

    SHA1

    3c998a95ff61cf2054c0b155d2a09cf7002d1779

    SHA256

    18a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb

    SHA512

    9e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1

  • memory/2008-54-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2008-55-0x0000000075631000-0x0000000075633000-memory.dmp

    Filesize

    8KB

  • memory/2008-56-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2008-63-0x0000000002650000-0x0000000002723000-memory.dmp

    Filesize

    844KB

  • memory/2008-64-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB