Analysis

  • max time kernel
    64s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 02:57

General

  • Target

    b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe

  • Size

    333KB

  • MD5

    b57d827eb7e524c3abb42a7941ec1c77

  • SHA1

    b3d2a59e3649217fdad21b3d822a27eda1950fc1

  • SHA256

    b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c

  • SHA512

    1fd8b10e8c3b7b7665a73e62590d1be49055d38a1c026b1967179822b5f8ab41d088094b8bfc2d2fb86ca294c9e86059a63ccd4a399aeb41e96ae49f9015230b

  • SSDEEP

    6144:rjrlCHxyhK7JhqF6muLi8YV+oM/JHLdmQndK1d0Jyc6xBiW/0:HrlzK7vC6HLifEBQlKJMc

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe
    "C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:340
    • C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe
      "C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Users\Admin\AppData\Local\Temp\update3.exe
        "C:\Users\Admin\AppData\Local\Temp\update3.exe"
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1244
        • C:\Users\Admin\AppData\Local\volmgr.exe
          "C:\Users\Admin\AppData\Local\volmgr.exe" C:\Users\Admin\AppData\Local\Temp\update3.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of UnmapMainImage
          PID:2044
      • C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe
        "C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe"
        3⤵
          PID:2032
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
      1⤵
        PID:1344

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\670D.tmp

        Filesize

        77KB

        MD5

        b07f78bf03bcb08ff33e39ec5a9e93c3

        SHA1

        acf93c06c080f059018202745cdc2f56ca31d4bb

        SHA256

        5df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483

        SHA512

        e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740

      • C:\Users\Admin\AppData\Local\Temp\670E.tmp

        Filesize

        40KB

        MD5

        bc90c8280b1c0064271e4124d2eb9772

        SHA1

        f6d353c8a92053fe2d433e661a6e10a96d5cf7a0

        SHA256

        39b4bdafdd0873db36327a9c513597ca3350f734e02072bd38c2254aab789efb

        SHA512

        b87dd6962a95390b58355ebf1bd076483de31ef073e879023ab5a7057bfc8d3b1d05fa123fa79368ef9f99f05363feedfbd35570d016b3fb8ad16848046ad110

      • C:\Users\Admin\AppData\Local\Temp\update3.exe

        Filesize

        164KB

        MD5

        21af5595448d385d7525a285dec66186

        SHA1

        464a7a95a183075e5819b4c1e960069577283348

        SHA256

        b20f56b3d052deafe9ea3fc6a1e20377c33c4503bd6f543f0e42a52afe19feeb

        SHA512

        f82e80da0293d0d81f73f06c2e718b749a803dcc4eda1111b9038c64fe156fa56693d71f79ef09a5c1a8c3699a61186de8d66c394c5e3ac0d61ed1e8ad705db7

      • C:\Users\Admin\AppData\Local\Temp\update3.exe

        Filesize

        164KB

        MD5

        21af5595448d385d7525a285dec66186

        SHA1

        464a7a95a183075e5819b4c1e960069577283348

        SHA256

        b20f56b3d052deafe9ea3fc6a1e20377c33c4503bd6f543f0e42a52afe19feeb

        SHA512

        f82e80da0293d0d81f73f06c2e718b749a803dcc4eda1111b9038c64fe156fa56693d71f79ef09a5c1a8c3699a61186de8d66c394c5e3ac0d61ed1e8ad705db7

      • C:\Users\Admin\AppData\Local\volmgr.dll

        Filesize

        40KB

        MD5

        bc90c8280b1c0064271e4124d2eb9772

        SHA1

        f6d353c8a92053fe2d433e661a6e10a96d5cf7a0

        SHA256

        39b4bdafdd0873db36327a9c513597ca3350f734e02072bd38c2254aab789efb

        SHA512

        b87dd6962a95390b58355ebf1bd076483de31ef073e879023ab5a7057bfc8d3b1d05fa123fa79368ef9f99f05363feedfbd35570d016b3fb8ad16848046ad110

      • C:\Users\Admin\AppData\Local\volmgr.exe

        Filesize

        77KB

        MD5

        b07f78bf03bcb08ff33e39ec5a9e93c3

        SHA1

        acf93c06c080f059018202745cdc2f56ca31d4bb

        SHA256

        5df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483

        SHA512

        e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740

      • C:\Users\Admin\AppData\Local\volmgr.exe

        Filesize

        77KB

        MD5

        b07f78bf03bcb08ff33e39ec5a9e93c3

        SHA1

        acf93c06c080f059018202745cdc2f56ca31d4bb

        SHA256

        5df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483

        SHA512

        e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740

      • \Users\Admin\AppData\Local\Temp\POSITION4DLLNAME.txt

        Filesize

        2KB

        MD5

        d1f3c6b92c7235527535e35fdb593eea

        SHA1

        05d9223fdec4515e629ba7baff48343174352d68

        SHA256

        5bdbe2de48c2e37cfde5a443439d254873157c66d1f205e609b999b6185bc266

        SHA512

        ab0c2fb281a30d5ceaf38e300903936c0b12b2b27fcf6decc212e0cdbda4ff3a9423e6a1a263bb94c0e355ec8647af22003ae3303fe87f77a0c2c0eab9820a7e

      • \Users\Admin\AppData\Local\Temp\update3.exe

        Filesize

        164KB

        MD5

        21af5595448d385d7525a285dec66186

        SHA1

        464a7a95a183075e5819b4c1e960069577283348

        SHA256

        b20f56b3d052deafe9ea3fc6a1e20377c33c4503bd6f543f0e42a52afe19feeb

        SHA512

        f82e80da0293d0d81f73f06c2e718b749a803dcc4eda1111b9038c64fe156fa56693d71f79ef09a5c1a8c3699a61186de8d66c394c5e3ac0d61ed1e8ad705db7

      • \Users\Admin\AppData\Local\Temp\update3.exe

        Filesize

        164KB

        MD5

        21af5595448d385d7525a285dec66186

        SHA1

        464a7a95a183075e5819b4c1e960069577283348

        SHA256

        b20f56b3d052deafe9ea3fc6a1e20377c33c4503bd6f543f0e42a52afe19feeb

        SHA512

        f82e80da0293d0d81f73f06c2e718b749a803dcc4eda1111b9038c64fe156fa56693d71f79ef09a5c1a8c3699a61186de8d66c394c5e3ac0d61ed1e8ad705db7

      • \Users\Admin\AppData\Local\Temp\update3.exe

        Filesize

        164KB

        MD5

        21af5595448d385d7525a285dec66186

        SHA1

        464a7a95a183075e5819b4c1e960069577283348

        SHA256

        b20f56b3d052deafe9ea3fc6a1e20377c33c4503bd6f543f0e42a52afe19feeb

        SHA512

        f82e80da0293d0d81f73f06c2e718b749a803dcc4eda1111b9038c64fe156fa56693d71f79ef09a5c1a8c3699a61186de8d66c394c5e3ac0d61ed1e8ad705db7

      • \Users\Admin\AppData\Local\Temp\update3.exe

        Filesize

        164KB

        MD5

        21af5595448d385d7525a285dec66186

        SHA1

        464a7a95a183075e5819b4c1e960069577283348

        SHA256

        b20f56b3d052deafe9ea3fc6a1e20377c33c4503bd6f543f0e42a52afe19feeb

        SHA512

        f82e80da0293d0d81f73f06c2e718b749a803dcc4eda1111b9038c64fe156fa56693d71f79ef09a5c1a8c3699a61186de8d66c394c5e3ac0d61ed1e8ad705db7

      • \Users\Admin\AppData\Local\volmgr.dll

        Filesize

        40KB

        MD5

        bc90c8280b1c0064271e4124d2eb9772

        SHA1

        f6d353c8a92053fe2d433e661a6e10a96d5cf7a0

        SHA256

        39b4bdafdd0873db36327a9c513597ca3350f734e02072bd38c2254aab789efb

        SHA512

        b87dd6962a95390b58355ebf1bd076483de31ef073e879023ab5a7057bfc8d3b1d05fa123fa79368ef9f99f05363feedfbd35570d016b3fb8ad16848046ad110

      • \Users\Admin\AppData\Local\volmgr.exe

        Filesize

        77KB

        MD5

        b07f78bf03bcb08ff33e39ec5a9e93c3

        SHA1

        acf93c06c080f059018202745cdc2f56ca31d4bb

        SHA256

        5df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483

        SHA512

        e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740

      • \Users\Admin\AppData\Local\volmgr.exe

        Filesize

        77KB

        MD5

        b07f78bf03bcb08ff33e39ec5a9e93c3

        SHA1

        acf93c06c080f059018202745cdc2f56ca31d4bb

        SHA256

        5df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483

        SHA512

        e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740

      • \Users\Admin\AppData\Local\volmgr.exe

        Filesize

        77KB

        MD5

        b07f78bf03bcb08ff33e39ec5a9e93c3

        SHA1

        acf93c06c080f059018202745cdc2f56ca31d4bb

        SHA256

        5df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483

        SHA512

        e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740

      • \Users\Admin\AppData\Local\volmgr.exe

        Filesize

        77KB

        MD5

        b07f78bf03bcb08ff33e39ec5a9e93c3

        SHA1

        acf93c06c080f059018202745cdc2f56ca31d4bb

        SHA256

        5df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483

        SHA512

        e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740

      • \Users\Admin\AppData\Local\volmgr.exe

        Filesize

        77KB

        MD5

        b07f78bf03bcb08ff33e39ec5a9e93c3

        SHA1

        acf93c06c080f059018202745cdc2f56ca31d4bb

        SHA256

        5df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483

        SHA512

        e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740

      • memory/340-54-0x0000000075771000-0x0000000075773000-memory.dmp

        Filesize

        8KB

      • memory/1244-88-0x0000000000230000-0x000000000025E000-memory.dmp

        Filesize

        184KB

      • memory/1244-89-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/1244-109-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/1244-106-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/1244-108-0x0000000000230000-0x000000000023D000-memory.dmp

        Filesize

        52KB

      • memory/1244-105-0x0000000000230000-0x000000000025E000-memory.dmp

        Filesize

        184KB

      • memory/1320-56-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/1320-63-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/1320-61-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/1320-60-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/1320-87-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/1320-67-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/1320-57-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/1320-59-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/2032-86-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/2032-78-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/2032-71-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/2032-75-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/2032-76-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/2032-73-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/2044-104-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/2044-107-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/2044-103-0x0000000000240000-0x0000000000258000-memory.dmp

        Filesize

        96KB

      • memory/2044-111-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/2044-112-0x0000000000280000-0x000000000028F000-memory.dmp

        Filesize

        60KB

      • memory/2044-113-0x0000000000320000-0x000000000032F000-memory.dmp

        Filesize

        60KB