Analysis

  • max time kernel
    241s
  • max time network
    337s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 11:09

General

  • Target

    9d94d21c6c0d6bb81f9cfebf3973419a189fd00533d97d1d983b96d71cc8f839.exe

  • Size

    239KB

  • MD5

    2f76a9f80d9ff4d19798974fdc632718

  • SHA1

    04c805d6f9ca9f9980ababd37cb94d12ff2d7bdd

  • SHA256

    9d94d21c6c0d6bb81f9cfebf3973419a189fd00533d97d1d983b96d71cc8f839

  • SHA512

    1d775bd1a50ebb9a3818b071887a3e775071fd9be24d4d9f1abde7de321ebbd389127a11e5545ed3c9941cf8b618261de37cf7e97829fd930cda5141f73b943b

  • SSDEEP

    3072:kXu/MVID9mJCQnj3WCW2EW5W656N38Mxis5A26BNNXOng:kjCVKhMPaRV

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d94d21c6c0d6bb81f9cfebf3973419a189fd00533d97d1d983b96d71cc8f839.exe
    "C:\Users\Admin\AppData\Local\Temp\9d94d21c6c0d6bb81f9cfebf3973419a189fd00533d97d1d983b96d71cc8f839.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:516
    • C:\Users\Admin\AppData\Local\Temp\nsk30C3.tmp\wnenvideocap.exe
      C:\Users\Admin\AppData\Local\Temp\nsk30C3.tmp\wnenvideocap.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Users\Admin\AppData\Local\Temp\japlut.exe
        "C:\Users\Admin\AppData\Local\Temp\japlut.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1836

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\japlut.exe

    Filesize

    28KB

    MD5

    23b6d9d77810faaa05a955016d4cb0fd

    SHA1

    cbe0dbbbaa7857ff22fd3ccdb8a2694f3c5715ad

    SHA256

    af02c225cf3336b6639cb1050c7b2abc92f18949bfa8f75eadbfeabdfbf02546

    SHA512

    4533128296f30715bfcb8060f76e71874aa8f47bb2484d870645bde5f276aa6b18cb401e3c697a34546aa4170ac0ebb739c395dbdb4ac2125810f461a343d100

  • C:\Users\Admin\AppData\Local\Temp\japlut.exe

    Filesize

    28KB

    MD5

    23b6d9d77810faaa05a955016d4cb0fd

    SHA1

    cbe0dbbbaa7857ff22fd3ccdb8a2694f3c5715ad

    SHA256

    af02c225cf3336b6639cb1050c7b2abc92f18949bfa8f75eadbfeabdfbf02546

    SHA512

    4533128296f30715bfcb8060f76e71874aa8f47bb2484d870645bde5f276aa6b18cb401e3c697a34546aa4170ac0ebb739c395dbdb4ac2125810f461a343d100

  • C:\Users\Admin\AppData\Local\Temp\nsk30C3.tmp\wnenvideocap.exe

    Filesize

    76KB

    MD5

    81ea9132c56734bf3a5a1f32fbff64df

    SHA1

    031244d43c3fd0397bb59ecf21e1796f794a0f20

    SHA256

    11620b8923b8659774912223bd2d5e3ce1285c673de98c97a959abab9dc4069e

    SHA512

    47507015b398af964a076c545bb784f660351cdf0d3836d36098d7f1148bece8b59c5c7d95d5ef49d5d9cf20106f1875480e13b8761190dd614c006e37b472df

  • C:\Users\Admin\AppData\Local\Temp\nsk30C3.tmp\wnenvideocap.exe

    Filesize

    76KB

    MD5

    81ea9132c56734bf3a5a1f32fbff64df

    SHA1

    031244d43c3fd0397bb59ecf21e1796f794a0f20

    SHA256

    11620b8923b8659774912223bd2d5e3ce1285c673de98c97a959abab9dc4069e

    SHA512

    47507015b398af964a076c545bb784f660351cdf0d3836d36098d7f1148bece8b59c5c7d95d5ef49d5d9cf20106f1875480e13b8761190dd614c006e37b472df

  • \Users\Admin\AppData\Local\Temp\japlut.exe

    Filesize

    28KB

    MD5

    23b6d9d77810faaa05a955016d4cb0fd

    SHA1

    cbe0dbbbaa7857ff22fd3ccdb8a2694f3c5715ad

    SHA256

    af02c225cf3336b6639cb1050c7b2abc92f18949bfa8f75eadbfeabdfbf02546

    SHA512

    4533128296f30715bfcb8060f76e71874aa8f47bb2484d870645bde5f276aa6b18cb401e3c697a34546aa4170ac0ebb739c395dbdb4ac2125810f461a343d100

  • \Users\Admin\AppData\Local\Temp\japlut.exe

    Filesize

    28KB

    MD5

    23b6d9d77810faaa05a955016d4cb0fd

    SHA1

    cbe0dbbbaa7857ff22fd3ccdb8a2694f3c5715ad

    SHA256

    af02c225cf3336b6639cb1050c7b2abc92f18949bfa8f75eadbfeabdfbf02546

    SHA512

    4533128296f30715bfcb8060f76e71874aa8f47bb2484d870645bde5f276aa6b18cb401e3c697a34546aa4170ac0ebb739c395dbdb4ac2125810f461a343d100

  • \Users\Admin\AppData\Local\Temp\japlut.exe

    Filesize

    28KB

    MD5

    23b6d9d77810faaa05a955016d4cb0fd

    SHA1

    cbe0dbbbaa7857ff22fd3ccdb8a2694f3c5715ad

    SHA256

    af02c225cf3336b6639cb1050c7b2abc92f18949bfa8f75eadbfeabdfbf02546

    SHA512

    4533128296f30715bfcb8060f76e71874aa8f47bb2484d870645bde5f276aa6b18cb401e3c697a34546aa4170ac0ebb739c395dbdb4ac2125810f461a343d100

  • \Users\Admin\AppData\Local\Temp\japlut.exe

    Filesize

    28KB

    MD5

    23b6d9d77810faaa05a955016d4cb0fd

    SHA1

    cbe0dbbbaa7857ff22fd3ccdb8a2694f3c5715ad

    SHA256

    af02c225cf3336b6639cb1050c7b2abc92f18949bfa8f75eadbfeabdfbf02546

    SHA512

    4533128296f30715bfcb8060f76e71874aa8f47bb2484d870645bde5f276aa6b18cb401e3c697a34546aa4170ac0ebb739c395dbdb4ac2125810f461a343d100

  • \Users\Admin\AppData\Local\Temp\japlut.exe

    Filesize

    28KB

    MD5

    23b6d9d77810faaa05a955016d4cb0fd

    SHA1

    cbe0dbbbaa7857ff22fd3ccdb8a2694f3c5715ad

    SHA256

    af02c225cf3336b6639cb1050c7b2abc92f18949bfa8f75eadbfeabdfbf02546

    SHA512

    4533128296f30715bfcb8060f76e71874aa8f47bb2484d870645bde5f276aa6b18cb401e3c697a34546aa4170ac0ebb739c395dbdb4ac2125810f461a343d100

  • \Users\Admin\AppData\Local\Temp\nsk30C3.tmp\wnenvideocap.exe

    Filesize

    76KB

    MD5

    81ea9132c56734bf3a5a1f32fbff64df

    SHA1

    031244d43c3fd0397bb59ecf21e1796f794a0f20

    SHA256

    11620b8923b8659774912223bd2d5e3ce1285c673de98c97a959abab9dc4069e

    SHA512

    47507015b398af964a076c545bb784f660351cdf0d3836d36098d7f1148bece8b59c5c7d95d5ef49d5d9cf20106f1875480e13b8761190dd614c006e37b472df

  • \Users\Admin\AppData\Local\Temp\nsk30C3.tmp\wnenvideocap.exe

    Filesize

    76KB

    MD5

    81ea9132c56734bf3a5a1f32fbff64df

    SHA1

    031244d43c3fd0397bb59ecf21e1796f794a0f20

    SHA256

    11620b8923b8659774912223bd2d5e3ce1285c673de98c97a959abab9dc4069e

    SHA512

    47507015b398af964a076c545bb784f660351cdf0d3836d36098d7f1148bece8b59c5c7d95d5ef49d5d9cf20106f1875480e13b8761190dd614c006e37b472df

  • \Users\Admin\AppData\Local\Temp\nsk30C3.tmp\wnenvideocap.exe

    Filesize

    76KB

    MD5

    81ea9132c56734bf3a5a1f32fbff64df

    SHA1

    031244d43c3fd0397bb59ecf21e1796f794a0f20

    SHA256

    11620b8923b8659774912223bd2d5e3ce1285c673de98c97a959abab9dc4069e

    SHA512

    47507015b398af964a076c545bb784f660351cdf0d3836d36098d7f1148bece8b59c5c7d95d5ef49d5d9cf20106f1875480e13b8761190dd614c006e37b472df

  • \Users\Admin\AppData\Local\Temp\nsk30C3.tmp\wnenvideocap.exe

    Filesize

    76KB

    MD5

    81ea9132c56734bf3a5a1f32fbff64df

    SHA1

    031244d43c3fd0397bb59ecf21e1796f794a0f20

    SHA256

    11620b8923b8659774912223bd2d5e3ce1285c673de98c97a959abab9dc4069e

    SHA512

    47507015b398af964a076c545bb784f660351cdf0d3836d36098d7f1148bece8b59c5c7d95d5ef49d5d9cf20106f1875480e13b8761190dd614c006e37b472df

  • \Users\Admin\AppData\Local\Temp\nsk30C3.tmp\wnenvideocap.exe

    Filesize

    76KB

    MD5

    81ea9132c56734bf3a5a1f32fbff64df

    SHA1

    031244d43c3fd0397bb59ecf21e1796f794a0f20

    SHA256

    11620b8923b8659774912223bd2d5e3ce1285c673de98c97a959abab9dc4069e

    SHA512

    47507015b398af964a076c545bb784f660351cdf0d3836d36098d7f1148bece8b59c5c7d95d5ef49d5d9cf20106f1875480e13b8761190dd614c006e37b472df

  • memory/516-54-0x0000000075551000-0x0000000075553000-memory.dmp

    Filesize

    8KB

  • memory/1480-57-0x0000000000000000-mapping.dmp

  • memory/1836-66-0x0000000000000000-mapping.dmp