Analysis

  • max time kernel
    358s
  • max time network
    406s
  • platform
    windows7_x64
  • resource
    win7-20221111-es
  • resource tags

    arch:x64arch:x86image:win7-20221111-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    01/12/2022, 19:54

General

  • Target

    ID-Arch_BTBMBCpdnyskuicdYKGQDZulurqjcmde.exe

  • Size

    330.6MB

  • MD5

    fe79a9145f396e8b86a713d19f559d11

  • SHA1

    4e1cc543ea89981a5bda109352a586fe5dedc41d

  • SHA256

    2a896061202535d0e69bdd3152be87a3e7724e4123fc28c305ea3d549fca3010

  • SHA512

    94d989b0340fcededf8b7620d2951328f7cb74c82530432ac869a43d2fff1c26ae28ffde4300a6c71c3498607203a04cce26a5883d0c08e8a4a38f860a18c01f

  • SSDEEP

    98304:dmBKLVauUnoQgac+rReihrEN2xbhMJ8w23nZSGdGNGWWST6or:kBoVdh3+hrq2xsp23siYGWWQr

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ID-Arch_BTBMBCpdnyskuicdYKGQDZulurqjcmde.exe
    "C:\Users\Admin\AppData\Local\Temp\ID-Arch_BTBMBCpdnyskuicdYKGQDZulurqjcmde.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:520
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1540
      • C:\ProgramData\DjiFlightTekDriverhDriv\DjiFlightTekDriverncDrivingxBerny.exe
        "C:\ProgramData\DjiFlightTekDriverhDriv\DjiFlightTekDriverncDrivingxBerny.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1676

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\DjiFlightTekDriverhDriv\DjiFlightTekDriverncDrivingxBerny.exe

      Filesize

      555.0MB

      MD5

      05f0de642e9790a8e5b6ac401c30afbc

      SHA1

      d53a80d9476dbbd419ea107c1fff1afd9f4ed77f

      SHA256

      7651a684c4a23f0ee70afa54f897c5a9fda61b0845d15f21b784c0a96a6c8eaf

      SHA512

      6f2edf95cb8461d38e2475172afa995128ce0a28688c2701cd5facc82bcf7c2ae64ad05c232a6cb230a305acc90885cc9c39fad09771204a94a5669c4e13e4a1

    • C:\ProgramData\DjiFlightTekDriverhDriv\DjiFlightTekDriverncDrivingxBerny.exe

      Filesize

      555.0MB

      MD5

      05f0de642e9790a8e5b6ac401c30afbc

      SHA1

      d53a80d9476dbbd419ea107c1fff1afd9f4ed77f

      SHA256

      7651a684c4a23f0ee70afa54f897c5a9fda61b0845d15f21b784c0a96a6c8eaf

      SHA512

      6f2edf95cb8461d38e2475172afa995128ce0a28688c2701cd5facc82bcf7c2ae64ad05c232a6cb230a305acc90885cc9c39fad09771204a94a5669c4e13e4a1

    • \ProgramData\DjiFlightTekDriverhDriv\DjiFlightTekDriverncDrivingxBerny.exe

      Filesize

      555.0MB

      MD5

      05f0de642e9790a8e5b6ac401c30afbc

      SHA1

      d53a80d9476dbbd419ea107c1fff1afd9f4ed77f

      SHA256

      7651a684c4a23f0ee70afa54f897c5a9fda61b0845d15f21b784c0a96a6c8eaf

      SHA512

      6f2edf95cb8461d38e2475172afa995128ce0a28688c2701cd5facc82bcf7c2ae64ad05c232a6cb230a305acc90885cc9c39fad09771204a94a5669c4e13e4a1

    • memory/520-54-0x00000000756D1000-0x00000000756D3000-memory.dmp

      Filesize

      8KB

    • memory/1540-56-0x000007FEFBE31000-0x000007FEFBE33000-memory.dmp

      Filesize

      8KB