Analysis

  • max time kernel
    187s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 07:40

General

  • Target

    fcbb4dce4a80e06d0d44a0c14a67d8ced01172b478cf65b67a0ca4e36092315f.exe

  • Size

    170KB

  • MD5

    0bde151394b94d91bd4a503198480c45

  • SHA1

    df572621dde562640191540124ff2743502856e9

  • SHA256

    fcbb4dce4a80e06d0d44a0c14a67d8ced01172b478cf65b67a0ca4e36092315f

  • SHA512

    a634478494a3efa25ee4c3735530855ae596ce4a936c5ac1871a12d4115631e8a122fb04754111fafdefbeac46da0755319232b592abe60c1fb54ba0cae1884a

  • SSDEEP

    3072:BkgdzHCxIX59qol268JJjg/ospD1dD5kkiPYTBaU0Bb:hbCx2FluJ6Bd1dyjab0B

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcbb4dce4a80e06d0d44a0c14a67d8ced01172b478cf65b67a0ca4e36092315f.exe
    "C:\Users\Admin\AppData\Local\Temp\fcbb4dce4a80e06d0d44a0c14a67d8ced01172b478cf65b67a0ca4e36092315f.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1892
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 388
      2⤵
      • Program crash
      PID:1740
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1892 -ip 1892
    1⤵
      PID:668

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1892-132-0x0000000000400000-0x000000000048A000-memory.dmp

            Filesize

            552KB

          • memory/1892-133-0x00000000005B0000-0x00000000005F6000-memory.dmp

            Filesize

            280KB