Analysis

  • max time kernel
    144s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 10:48

General

  • Target

    5242a8c409113ffee59b6317aaa96ebe7f21485e88f5ca7065545ce5bc0b9d1f.exe

  • Size

    170KB

  • MD5

    3885f2cdedf7facbec539074330331ab

  • SHA1

    00d27c8dd889dd03559d5ce37330a19b6fd6da22

  • SHA256

    5242a8c409113ffee59b6317aaa96ebe7f21485e88f5ca7065545ce5bc0b9d1f

  • SHA512

    a270c6743a27402ad381046f8c42ec0eb97678605a66b5f70e6c0d343811ed7098a8e978db1b300acee0c7b238ab411105f67e629218d800f89923b043bc0af3

  • SSDEEP

    3072:4gXdZt9P6D3XJcMCFW8p9gyWDlnADWOTosCCLMAjPkbBvrELb8AHmqP:4e34fCFB9TWpnhOTOCLMEeZEL1H1P

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5242a8c409113ffee59b6317aaa96ebe7f21485e88f5ca7065545ce5bc0b9d1f.exe
    "C:\Users\Admin\AppData\Local\Temp\5242a8c409113ffee59b6317aaa96ebe7f21485e88f5ca7065545ce5bc0b9d1f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\nsy6569.tmp\bgrjolsd.dll",DllRegisterServer
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:904
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Netscape\eynybybg.dll,DllRegisterServer
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsy6569.tmp\bgrjolsd.dll

    Filesize

    782KB

    MD5

    0617d89053acad4f0259b515b8ae42ee

    SHA1

    2c651d9f62d4cfb24997f02a860b2634ec815cac

    SHA256

    f64bcac34581e0ede38ab3e1d191c27a3651317de7f825162d7f4852756b1f32

    SHA512

    96961937a72a527ceb318d035ee711eadadc316627cbeec51728a7d9d1e20d6f54c80f03d320baa1a416e8f818fcf4c89d099268ef0e4aac2e0dae7857d15e52

  • \Users\Admin\AppData\Local\Temp\nsy6569.tmp\bgrjolsd.dll

    Filesize

    782KB

    MD5

    0617d89053acad4f0259b515b8ae42ee

    SHA1

    2c651d9f62d4cfb24997f02a860b2634ec815cac

    SHA256

    f64bcac34581e0ede38ab3e1d191c27a3651317de7f825162d7f4852756b1f32

    SHA512

    96961937a72a527ceb318d035ee711eadadc316627cbeec51728a7d9d1e20d6f54c80f03d320baa1a416e8f818fcf4c89d099268ef0e4aac2e0dae7857d15e52

  • \Users\Admin\AppData\Local\Temp\nsy6569.tmp\bgrjolsd.dll

    Filesize

    782KB

    MD5

    0617d89053acad4f0259b515b8ae42ee

    SHA1

    2c651d9f62d4cfb24997f02a860b2634ec815cac

    SHA256

    f64bcac34581e0ede38ab3e1d191c27a3651317de7f825162d7f4852756b1f32

    SHA512

    96961937a72a527ceb318d035ee711eadadc316627cbeec51728a7d9d1e20d6f54c80f03d320baa1a416e8f818fcf4c89d099268ef0e4aac2e0dae7857d15e52

  • \Users\Admin\AppData\Local\Temp\nsy6569.tmp\bgrjolsd.dll

    Filesize

    782KB

    MD5

    0617d89053acad4f0259b515b8ae42ee

    SHA1

    2c651d9f62d4cfb24997f02a860b2634ec815cac

    SHA256

    f64bcac34581e0ede38ab3e1d191c27a3651317de7f825162d7f4852756b1f32

    SHA512

    96961937a72a527ceb318d035ee711eadadc316627cbeec51728a7d9d1e20d6f54c80f03d320baa1a416e8f818fcf4c89d099268ef0e4aac2e0dae7857d15e52

  • \Users\Admin\AppData\Local\Temp\nsy6569.tmp\bgrjolsd.dll

    Filesize

    782KB

    MD5

    0617d89053acad4f0259b515b8ae42ee

    SHA1

    2c651d9f62d4cfb24997f02a860b2634ec815cac

    SHA256

    f64bcac34581e0ede38ab3e1d191c27a3651317de7f825162d7f4852756b1f32

    SHA512

    96961937a72a527ceb318d035ee711eadadc316627cbeec51728a7d9d1e20d6f54c80f03d320baa1a416e8f818fcf4c89d099268ef0e4aac2e0dae7857d15e52

  • memory/1756-64-0x0000000008730000-0x0000000008802000-memory.dmp

    Filesize

    840KB

  • memory/1756-65-0x0000000008730000-0x0000000008802000-memory.dmp

    Filesize

    840KB

  • memory/1940-54-0x0000000075B41000-0x0000000075B43000-memory.dmp

    Filesize

    8KB