Analysis

  • max time kernel
    122s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2022 22:14

General

  • Target

    d165f6e5ee5ec5854a8d0fb8501a625d73b8ac24ae1f37ea56865d54942eb945.exe

  • Size

    16KB

  • MD5

    6d8e6d8409359382519fbe6d43a27d66

  • SHA1

    3f2290a9f01ac3384a428cadd0a39d305eacb831

  • SHA256

    d165f6e5ee5ec5854a8d0fb8501a625d73b8ac24ae1f37ea56865d54942eb945

  • SHA512

    27925b6b7d3de939ec0fac74d4997c7be2b800e6778b9e276f20dd6de1662aca73832b423981591bbe0200b4885b9a8549eb77ef24609c4799e4e2f8338cf70f

  • SSDEEP

    384:rwxFz66WAVDoG9LG16gZLZYJ5GOLPH1SiVRPlZjNLFx6p:r8ctAtBQ16CZYfGOoKPFxq

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 42 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d165f6e5ee5ec5854a8d0fb8501a625d73b8ac24ae1f37ea56865d54942eb945.exe
    "C:\Users\Admin\AppData\Local\Temp\d165f6e5ee5ec5854a8d0fb8501a625d73b8ac24ae1f37ea56865d54942eb945.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c regedit /s "C:\Users\Admin\AppData\Local\Temp\TempIE.reg"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3808
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s "C:\Users\Admin\AppData\Local\Temp\TempIE.reg"
        3⤵
        • Modifies registry class
        • Runs .reg file with regedit
        PID:840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TempIE.reg

    Filesize

    2KB

    MD5

    bf050ae6f7573dbb0823dff030851dee

    SHA1

    46de6ffd8e85c6edce14aa9a730ca776cf1fad46

    SHA256

    9d483d5aa98bf9dc97306442769f4703f07e7ea3fce24fedd169e3b15d7385b2

    SHA512

    b708ec524211d7787e4540f2f7c6103720c2f523e26ea4c854558edc734e59bc6a4e14e350b4ebf1af7a75718fe85a7d28e765405f629c9304ef67fa3b246846

  • memory/2016-132-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2016-138-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB