Analysis

  • max time kernel
    43s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 05:09

General

  • Target

    a6741bcb835dce69bc6d6c1f4ca886be030341206ce94f9d716c937e27c1169c.exe

  • Size

    111KB

  • MD5

    223db6bc79034ede41bd38cd74a2c1a6

  • SHA1

    4ce8a139a2b7b90fb14202c43e24ba7c3180ff05

  • SHA256

    a6741bcb835dce69bc6d6c1f4ca886be030341206ce94f9d716c937e27c1169c

  • SHA512

    aa72b4a9be7bfd591a672e0def4f1068e2cb62fb65a35afe824db9ca32c032e918f5a8fbbb4b763d32815999ef606f169268d0e66b4fc0b340b6543c88148122

  • SSDEEP

    3072:nUzqI8u5oAMGTKEEjlDYDlJFsi9z0QFIb:mMGewBg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6741bcb835dce69bc6d6c1f4ca886be030341206ce94f9d716c937e27c1169c.exe
    "C:\Users\Admin\AppData\Local\Temp\a6741bcb835dce69bc6d6c1f4ca886be030341206ce94f9d716c937e27c1169c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Zqz..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:992

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Zqz..bat

    Filesize

    274B

    MD5

    8cef84018efed08c1b567b7317b4919c

    SHA1

    ad135d91c554350425dd34063b61cd8807485c2a

    SHA256

    94e5ebbe691f500409d5dc1921f329f2c3b88c30ee484416a337cf4bc43d4885

    SHA512

    4bdac18105131809330be3495c0cb174a04978d3c17bf2c9c1e6fca5d3291ac03bb55920ca2b7172ead817e83ad5aa499f7886ea615bf9312e92bf31756eb70c

  • memory/1900-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB

  • memory/1900-55-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1900-57-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB