Analysis

  • max time kernel
    89s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 17:10

General

  • Target

    becd4a1769feee497b51cfea1dc13bf4cfa7246f05d1c230b0e3ee0a4ed6e18c.exe

  • Size

    420KB

  • MD5

    721b099b3736879cff2da2dace30e77a

  • SHA1

    9e2e610dd2c6dbfc347979dee7c1a80e519f3336

  • SHA256

    becd4a1769feee497b51cfea1dc13bf4cfa7246f05d1c230b0e3ee0a4ed6e18c

  • SHA512

    36059b3efe1a9a8e16b7bbc7161379987704e2d3a8f32e03870d8142aadf5c020f264286f48d2f6657626f8683657490519e28c9023c4d74b709b566f0ad3144

  • SSDEEP

    6144:A5PThKXOCIr/THcclUvDlHBB9qveGUnANsMhf64LhflMBq6Z0iclW:eThKbIr/SZHv4veGhfVLhP6Z0iS

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\becd4a1769feee497b51cfea1dc13bf4cfa7246f05d1c230b0e3ee0a4ed6e18c.exe
    "C:\Users\Admin\AppData\Local\Temp\becd4a1769feee497b51cfea1dc13bf4cfa7246f05d1c230b0e3ee0a4ed6e18c.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" ::{20D04FE0-3AEA-1069-A2D8-08002B30309D}
      2⤵
        PID:892
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Checks processor information in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:1592

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/892-57-0x0000000074AC1000-0x0000000074AC3000-memory.dmp

      Filesize

      8KB

    • memory/1392-54-0x0000000075521000-0x0000000075523000-memory.dmp

      Filesize

      8KB

    • memory/1592-58-0x000007FEFBA81000-0x000007FEFBA83000-memory.dmp

      Filesize

      8KB

    • memory/1592-59-0x0000000003740000-0x0000000003750000-memory.dmp

      Filesize

      64KB