Analysis

  • max time kernel
    233s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 01:31

General

  • Target

    b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe

  • Size

    255KB

  • MD5

    c4c74ebabf935baa19f5e12d3359833e

  • SHA1

    82376fb1a9255b1903073622e59bc2c57f641ab2

  • SHA256

    b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c

  • SHA512

    2c80ed7b1ddf29fa970c3509c2683c3dfa3e077d2a0f5ba093aa7d26dbd45cdf9685907e3a231984789afb1e664c82dac30b70a83ec5c365089bbc8fda861ec3

  • SSDEEP

    6144:WjswHa4HKnkvErZCU5Be0VsRoqbxMlm1eRTPDg:Z4HKkvERIKsjDeRvg

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe
    "C:\Users\Admin\AppData\Local\Temp\b43665fbbcb7f432d71747e205d51df085f429b232ad1005a4ea7aac82766b2c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Roaming\keygen.exe
      "C:\Users\Admin\AppData\Roaming\keygen.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1444
    • C:\Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe
      "C:\Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 104
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1660

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

          Filesize

          129KB

          MD5

          2599185bace0bbd1b9f92e7e3e719737

          SHA1

          36367008a3074d344d2f1e4c457e9c5d4b188a0c

          SHA256

          3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

          SHA512

          195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

        • C:\Users\Admin\AppData\Roaming\keygen.exe

          Filesize

          79KB

          MD5

          4cab60b6428608b76dbe0f1f12b6cc02

          SHA1

          964922c9cfa4df9059aa2090ccadecd30b8d9d4f

          SHA256

          be741f127a0be9bd8796ffddb6b29a4d907aaf2e895bbf6a3e74e6648896f7cb

          SHA512

          0072c8882c6f00cef014536be749dbf5cbceaebd1ce4b73635cf12ba9aac66b3ff1e8a532f2f35bbca501cbd66caca6caac6bbb9a419758c26d784640074682d

        • C:\Users\Admin\AppData\Roaming\keygen.exe

          Filesize

          79KB

          MD5

          4cab60b6428608b76dbe0f1f12b6cc02

          SHA1

          964922c9cfa4df9059aa2090ccadecd30b8d9d4f

          SHA256

          be741f127a0be9bd8796ffddb6b29a4d907aaf2e895bbf6a3e74e6648896f7cb

          SHA512

          0072c8882c6f00cef014536be749dbf5cbceaebd1ce4b73635cf12ba9aac66b3ff1e8a532f2f35bbca501cbd66caca6caac6bbb9a419758c26d784640074682d

        • \Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

          Filesize

          129KB

          MD5

          2599185bace0bbd1b9f92e7e3e719737

          SHA1

          36367008a3074d344d2f1e4c457e9c5d4b188a0c

          SHA256

          3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

          SHA512

          195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

        • \Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

          Filesize

          129KB

          MD5

          2599185bace0bbd1b9f92e7e3e719737

          SHA1

          36367008a3074d344d2f1e4c457e9c5d4b188a0c

          SHA256

          3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

          SHA512

          195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

        • \Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

          Filesize

          129KB

          MD5

          2599185bace0bbd1b9f92e7e3e719737

          SHA1

          36367008a3074d344d2f1e4c457e9c5d4b188a0c

          SHA256

          3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

          SHA512

          195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

        • \Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

          Filesize

          129KB

          MD5

          2599185bace0bbd1b9f92e7e3e719737

          SHA1

          36367008a3074d344d2f1e4c457e9c5d4b188a0c

          SHA256

          3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

          SHA512

          195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

        • \Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

          Filesize

          129KB

          MD5

          2599185bace0bbd1b9f92e7e3e719737

          SHA1

          36367008a3074d344d2f1e4c457e9c5d4b188a0c

          SHA256

          3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

          SHA512

          195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

        • \Users\Admin\AppData\Roaming\303443_2599185bace0bbd1b9f92e7e3e719737.exe

          Filesize

          129KB

          MD5

          2599185bace0bbd1b9f92e7e3e719737

          SHA1

          36367008a3074d344d2f1e4c457e9c5d4b188a0c

          SHA256

          3449e496b012e271e7dc6d3bd9b2bf5ca0c85c8ebe75d4d3e2b2ab48411945d8

          SHA512

          195a1d34415c65829d7cc593b9db0569b32bd289e36b3082a903c7378d5ad790b52868fa41bf74bc7382690a9a756a299925a9cd3beb2262ddec0276419736e2

        • \Users\Admin\AppData\Roaming\keygen.exe

          Filesize

          79KB

          MD5

          4cab60b6428608b76dbe0f1f12b6cc02

          SHA1

          964922c9cfa4df9059aa2090ccadecd30b8d9d4f

          SHA256

          be741f127a0be9bd8796ffddb6b29a4d907aaf2e895bbf6a3e74e6648896f7cb

          SHA512

          0072c8882c6f00cef014536be749dbf5cbceaebd1ce4b73635cf12ba9aac66b3ff1e8a532f2f35bbca501cbd66caca6caac6bbb9a419758c26d784640074682d

        • memory/1012-71-0x0000000000230000-0x000000000024E000-memory.dmp

          Filesize

          120KB

        • memory/1012-74-0x0000000000230000-0x000000000024E000-memory.dmp

          Filesize

          120KB

        • memory/1244-56-0x00000000759F1000-0x00000000759F3000-memory.dmp

          Filesize

          8KB

        • memory/1444-65-0x000007FEF3490000-0x000007FEF3EB3000-memory.dmp

          Filesize

          10.1MB

        • memory/1444-73-0x000007FEF1D10000-0x000007FEF2DA6000-memory.dmp

          Filesize

          16.6MB

        • memory/1444-75-0x0000000002016000-0x0000000002035000-memory.dmp

          Filesize

          124KB

        • memory/1444-76-0x0000000002016000-0x0000000002035000-memory.dmp

          Filesize

          124KB