Analysis

  • max time kernel
    235s
  • max time network
    335s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 18:15

General

  • Target

    461f80a7835f6660005e184ceae6df4fa24807836ea4c355182e312131c326c5.exe

  • Size

    2.6MB

  • MD5

    8547c878787692870f6cb73ac772c4e6

  • SHA1

    ae44b0581d5c3bee317873cbf0e23044d45eac62

  • SHA256

    461f80a7835f6660005e184ceae6df4fa24807836ea4c355182e312131c326c5

  • SHA512

    3c0528e914aa2c54bc2dc1f6c9ad71e10eb18c228be8ac77eabbfb71beaf277f4df8582fa491ab53631c20d220b644054646a2a8cc18073c2c5aea293617dd86

  • SSDEEP

    49152:G+pw97HhY6Hk009aeWyGitBdxPBJjXlapqwnLTWmOpQw1VW5qDASDTu5SZbNUI3L:GaQB3EVaLitBd14ptLTKMARyYkIL

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\461f80a7835f6660005e184ceae6df4fa24807836ea4c355182e312131c326c5.exe
    "C:\Users\Admin\AppData\Local\Temp\461f80a7835f6660005e184ceae6df4fa24807836ea4c355182e312131c326c5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\hkcmd.exe
      "C:\Users\Admin\AppData\Local\hkcmd.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:892
    • C:\Users\Admin\AppData\Local\Best Fosil Bot 1875.01.exe
      "C:\Users\Admin\AppData\Local\Best Fosil Bot 1875.01.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:872

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Best Fosil Bot 1875.01.exe

    Filesize

    440KB

    MD5

    633875fc24ecb543bb57a0524d7de85b

    SHA1

    cea2629133688eb228f5268a7851ff22a5b5fb46

    SHA256

    6a2c0e3ab4dbf9664da49a0ca133441bdc5d1f8b5bfaa5ab363607af5cab3386

    SHA512

    cd656e1302d78a8119ff2ed568fbefca797ed4905520bf235e3241c113b2510f672e06ec749af54415bbd1be5e06a4fed56a8941f61ec1b716a16bc334e17faa

  • C:\Users\Admin\AppData\Local\hkcmd.exe

    Filesize

    2.6MB

    MD5

    8547c878787692870f6cb73ac772c4e6

    SHA1

    ae44b0581d5c3bee317873cbf0e23044d45eac62

    SHA256

    461f80a7835f6660005e184ceae6df4fa24807836ea4c355182e312131c326c5

    SHA512

    3c0528e914aa2c54bc2dc1f6c9ad71e10eb18c228be8ac77eabbfb71beaf277f4df8582fa491ab53631c20d220b644054646a2a8cc18073c2c5aea293617dd86

  • \Users\Admin\AppData\Local\Best Fosil Bot 1875.01.exe

    Filesize

    440KB

    MD5

    633875fc24ecb543bb57a0524d7de85b

    SHA1

    cea2629133688eb228f5268a7851ff22a5b5fb46

    SHA256

    6a2c0e3ab4dbf9664da49a0ca133441bdc5d1f8b5bfaa5ab363607af5cab3386

    SHA512

    cd656e1302d78a8119ff2ed568fbefca797ed4905520bf235e3241c113b2510f672e06ec749af54415bbd1be5e06a4fed56a8941f61ec1b716a16bc334e17faa

  • \Users\Admin\AppData\Local\Best Fosil Bot 1875.01.exe

    Filesize

    440KB

    MD5

    633875fc24ecb543bb57a0524d7de85b

    SHA1

    cea2629133688eb228f5268a7851ff22a5b5fb46

    SHA256

    6a2c0e3ab4dbf9664da49a0ca133441bdc5d1f8b5bfaa5ab363607af5cab3386

    SHA512

    cd656e1302d78a8119ff2ed568fbefca797ed4905520bf235e3241c113b2510f672e06ec749af54415bbd1be5e06a4fed56a8941f61ec1b716a16bc334e17faa

  • \Users\Admin\AppData\Local\hkcmd.exe

    Filesize

    2.6MB

    MD5

    8547c878787692870f6cb73ac772c4e6

    SHA1

    ae44b0581d5c3bee317873cbf0e23044d45eac62

    SHA256

    461f80a7835f6660005e184ceae6df4fa24807836ea4c355182e312131c326c5

    SHA512

    3c0528e914aa2c54bc2dc1f6c9ad71e10eb18c228be8ac77eabbfb71beaf277f4df8582fa491ab53631c20d220b644054646a2a8cc18073c2c5aea293617dd86

  • \Users\Admin\AppData\Local\hkcmd.exe

    Filesize

    2.6MB

    MD5

    8547c878787692870f6cb73ac772c4e6

    SHA1

    ae44b0581d5c3bee317873cbf0e23044d45eac62

    SHA256

    461f80a7835f6660005e184ceae6df4fa24807836ea4c355182e312131c326c5

    SHA512

    3c0528e914aa2c54bc2dc1f6c9ad71e10eb18c228be8ac77eabbfb71beaf277f4df8582fa491ab53631c20d220b644054646a2a8cc18073c2c5aea293617dd86

  • memory/756-54-0x0000000074E61000-0x0000000074E63000-memory.dmp

    Filesize

    8KB

  • memory/892-62-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/892-64-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/892-65-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/892-66-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/892-59-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB

  • memory/892-57-0x0000000000400000-0x0000000000556000-memory.dmp

    Filesize

    1.3MB