Analysis

  • max time kernel
    153s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 10:29

General

  • Target

    893f16d88761ca4a3527f7f5a267ea5d9e013a8e9aac851cc9947f78fd9e717a.exe

  • Size

    22.5MB

  • MD5

    c125715cc082fe693f5efa39912837bb

  • SHA1

    873369200aa459b19dfe0e1f825db7fcd4ec99f6

  • SHA256

    893f16d88761ca4a3527f7f5a267ea5d9e013a8e9aac851cc9947f78fd9e717a

  • SHA512

    7978d8d18081fef9745919701e8070d5c27289498c9ea4efe69fc2d1bb1dd2283a201b81dee2cb4331aa9e67a0be082296664d015643422ee6af90627fafb8e3

  • SSDEEP

    49152:Ycy52F1BTTWAXv7XnOMj5e1K7x6494Vlc2GXvJTijowTMfbGK:YcTbnw1K7x6i4Vlc2shU2bd

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 32 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\893f16d88761ca4a3527f7f5a267ea5d9e013a8e9aac851cc9947f78fd9e717a.exe
    "C:\Users\Admin\AppData\Local\Temp\893f16d88761ca4a3527f7f5a267ea5d9e013a8e9aac851cc9947f78fd9e717a.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\g86C37\AdeptTck_setup.exe
      C:\Users\Admin\AppData\Local\Temp\g86C37\AdeptTck_setup.exe
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:100
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2120

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\g86C37\AdeptTck_setup.exe

            Filesize

            718KB

            MD5

            d0aa4e89e9c93b31af211348059139ba

            SHA1

            f04d2ecb6eaff92c751d6acae38735370c2f7b3c

            SHA256

            016891ffdbfee6cc5f7695eaf66ce066bed45f78e3642fd19213837567f94e39

            SHA512

            39d584cd6d501fdf70881fe2c8a385d11c4f7f98bd85fdc6445a4f6bb45f7c09f910619e9e24507181633e77870a6e839a38627a8e81123db2ba4647798c6617

          • C:\Users\Admin\AppData\Local\Temp\g86C37\AdeptTck_setup.exe

            Filesize

            718KB

            MD5

            d0aa4e89e9c93b31af211348059139ba

            SHA1

            f04d2ecb6eaff92c751d6acae38735370c2f7b3c

            SHA256

            016891ffdbfee6cc5f7695eaf66ce066bed45f78e3642fd19213837567f94e39

            SHA512

            39d584cd6d501fdf70881fe2c8a385d11c4f7f98bd85fdc6445a4f6bb45f7c09f910619e9e24507181633e77870a6e839a38627a8e81123db2ba4647798c6617

          • memory/100-135-0x0000000000400000-0x000000000064D000-memory.dmp

            Filesize

            2.3MB

          • memory/100-137-0x0000000000400000-0x000000000064D000-memory.dmp

            Filesize

            2.3MB