Analysis

  • max time kernel
    38s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 16:19

General

  • Target

    a29223d6d22ebbfc9ff68bc41af05b3509843a390b1e3f1a883b829f4007e1b5.exe

  • Size

    102KB

  • MD5

    a7591dfb57df7926c9e081bc71b79b6a

  • SHA1

    0d294dfc85b2fff024743da49d54926d6340392a

  • SHA256

    a29223d6d22ebbfc9ff68bc41af05b3509843a390b1e3f1a883b829f4007e1b5

  • SHA512

    37f26ec7dd00154ac0f8bb28fef9eae506867debc0ec401693e5e304e4b0679c5f6f4216a36e953b854e25d3cac361968c7d5da038bb85f67fff1729dd74cfc4

  • SSDEEP

    1536:MIm5q1G27NKjwO5rF1EhByNLjXXXXXXHP2HmAXwVlQJHCBiIthuDf:zm+Kjwyr3EByNHYmAXwMiU+m

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
    1⤵
      PID:756
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k RPCSS
      1⤵
        PID:680
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs
        1⤵
          PID:884
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
          1⤵
            PID:1088
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
            1⤵
              PID:536
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k NetworkService
              1⤵
                PID:292
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalService
                1⤵
                  PID:852
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                  1⤵
                    PID:816
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k DcomLaunch
                    1⤵
                      PID:604
                    • C:\Users\Admin\AppData\Local\Temp\a29223d6d22ebbfc9ff68bc41af05b3509843a390b1e3f1a883b829f4007e1b5.exe
                      "C:\Users\Admin\AppData\Local\Temp\a29223d6d22ebbfc9ff68bc41af05b3509843a390b1e3f1a883b829f4007e1b5.exe"
                      1⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1664
                      • C:\Windows\SysWOW64\regsvr32.exe
                        "C:\Windows\system32\regsvr32.exe" /s C:\Users\Admin\AppData\Local\Temp\6c24c1~.tmp ,C:\Users\Admin\AppData\Local\Temp\a29223d6d22ebbfc9ff68bc41af05b3509843a390b1e3f1a883b829f4007e1b5.exe
                        2⤵
                        • Deletes itself
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1820
                        • C:\Windows\SysWOW64\takeown.exe
                          takeown /f "C:\Windows\system32\rpcss.dll"
                          3⤵
                          • Possible privilege escalation attempt
                          • Modifies file permissions
                          • Suspicious use of AdjustPrivilegeToken
                          PID:632
                        • C:\Windows\SysWOW64\icacls.exe
                          icacls "C:\Windows\system32\rpcss.dll" /grant administrators:F
                          3⤵
                          • Possible privilege escalation attempt
                          • Modifies file permissions
                          PID:1324
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c del %%SystemRoot%%\system32\rpcss.dll~*
                          3⤵
                            PID:1640

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\6c24c1~.tmp

                        Filesize

                        960KB

                        MD5

                        4fcda51d0638eaefde8562ec2a44ed11

                        SHA1

                        9d4f9c78f06e85f53ae8acec0b5e433e0203569a

                        SHA256

                        84172de4b1d0eeb8fb22e77c6ac8f32c203c37eff65b6a1894296ecf30278cbc

                        SHA512

                        655b796ac553a2dd6fc53188c74c88aa4fc32865a2842e30330b11c1c4d51ae59774be7254ca207257b32b971942bbc31c46f841ea60f2f5b2870cabedbc79af

                      • \Users\Admin\AppData\Local\Temp\6c24c1~.tmp

                        Filesize

                        960KB

                        MD5

                        4fcda51d0638eaefde8562ec2a44ed11

                        SHA1

                        9d4f9c78f06e85f53ae8acec0b5e433e0203569a

                        SHA256

                        84172de4b1d0eeb8fb22e77c6ac8f32c203c37eff65b6a1894296ecf30278cbc

                        SHA512

                        655b796ac553a2dd6fc53188c74c88aa4fc32865a2842e30330b11c1c4d51ae59774be7254ca207257b32b971942bbc31c46f841ea60f2f5b2870cabedbc79af

                      • memory/632-59-0x0000000000000000-mapping.dmp

                      • memory/1324-60-0x0000000000000000-mapping.dmp

                      • memory/1640-70-0x0000000000000000-mapping.dmp

                      • memory/1664-54-0x0000000074AD1000-0x0000000074AD3000-memory.dmp

                        Filesize

                        8KB

                      • memory/1820-55-0x0000000000000000-mapping.dmp