Analysis

  • max time kernel
    149s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 12:59

General

  • Target

    e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe

  • Size

    443KB

  • MD5

    a82385182fc4021d2c6a9535b27ce28b

  • SHA1

    b5b753b65bf54439a72fce016ab0bb48e81a53a8

  • SHA256

    e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16

  • SHA512

    ec1f636b9590f0c7ab6065e9177dcc23095b4d2eb34b0e5fcd2d6c8a16edb44cf6e2b95123dfcf5f3ea08bbdce192008d79c3262b390c0c5cae5cb7eefa1f13b

  • SSDEEP

    6144:5ZunObR8sVImcyYC5JZz3jzB8kOQIq+3mxkyJIrC+J/pbKvCB23xqy7uXhY7pOKy:WK+mzJ/6Y+4hupHQYyqXh6ZyDlQ3KMC

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 7 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe
    "C:\Users\Admin\AppData\Local\Temp\e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\loadwg.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\loadwg.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\chdwg.exe
        chdwg.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1160

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\chdwg.exe

          Filesize

          15KB

          MD5

          929e8e48a71ce23df251af2b8253f23f

          SHA1

          73992e5ddbf545b49adb686726d3226f6013c4ce

          SHA256

          5edbfc81e21a29786fac719b8c4f2e62a0505971b2e16440b5d02a9804d08d66

          SHA512

          ce49412b5d700cc231ad655dd6a605216f6d5f6f5f1c5f43f1c9f29b2ffd872fd2bb7b4956359d75be44bfbaedd7353d8f3ccf5852662c215884dbf5936edd48

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\chdwg.exe

          Filesize

          15KB

          MD5

          929e8e48a71ce23df251af2b8253f23f

          SHA1

          73992e5ddbf545b49adb686726d3226f6013c4ce

          SHA256

          5edbfc81e21a29786fac719b8c4f2e62a0505971b2e16440b5d02a9804d08d66

          SHA512

          ce49412b5d700cc231ad655dd6a605216f6d5f6f5f1c5f43f1c9f29b2ffd872fd2bb7b4956359d75be44bfbaedd7353d8f3ccf5852662c215884dbf5936edd48

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\loadwg.exe

          Filesize

          334KB

          MD5

          bae3eb4767317ba6eb0805347f32c66c

          SHA1

          644ae6e107658e478f15dfce652fcb0e4e493af6

          SHA256

          a982cdae025294cc536d2d429205151e6934dd54b2850af220bed6f58f4c1dfb

          SHA512

          01ce521798e583be251839f53397b104b35aec8800e282496196824163138efc866f553805c330bdf5653b16c215eafb07a0ea08a0fb122a28f0d4d72298160e

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\loadwg.exe

          Filesize

          334KB

          MD5

          bae3eb4767317ba6eb0805347f32c66c

          SHA1

          644ae6e107658e478f15dfce652fcb0e4e493af6

          SHA256

          a982cdae025294cc536d2d429205151e6934dd54b2850af220bed6f58f4c1dfb

          SHA512

          01ce521798e583be251839f53397b104b35aec8800e282496196824163138efc866f553805c330bdf5653b16c215eafb07a0ea08a0fb122a28f0d4d72298160e

        • C:\Windows\inf\xxy.dll

          Filesize

          23KB

          MD5

          b42620f56d958611152358b3e0092df3

          SHA1

          a185f6e21ad591715f5d2a061a82e9e3400e6a14

          SHA256

          c91453f20030eaf2811cd3ae5bbcd8cf8f5e0da111cd61148d68781e1f63472c

          SHA512

          dc4b210bf66a5b28d2638e7a6d5f9ec1faebc37bcc22542f7313e16547e7633cf6488e574ea33beabe6513f4c070ed90ccdb97cce8de61e5e803fe1496b0d7ba

        • \Users\Admin\AppData\Local\Temp\RarSFX0\chdwg.exe

          Filesize

          15KB

          MD5

          929e8e48a71ce23df251af2b8253f23f

          SHA1

          73992e5ddbf545b49adb686726d3226f6013c4ce

          SHA256

          5edbfc81e21a29786fac719b8c4f2e62a0505971b2e16440b5d02a9804d08d66

          SHA512

          ce49412b5d700cc231ad655dd6a605216f6d5f6f5f1c5f43f1c9f29b2ffd872fd2bb7b4956359d75be44bfbaedd7353d8f3ccf5852662c215884dbf5936edd48

        • \Users\Admin\AppData\Local\Temp\RarSFX0\chdwg.exe

          Filesize

          15KB

          MD5

          929e8e48a71ce23df251af2b8253f23f

          SHA1

          73992e5ddbf545b49adb686726d3226f6013c4ce

          SHA256

          5edbfc81e21a29786fac719b8c4f2e62a0505971b2e16440b5d02a9804d08d66

          SHA512

          ce49412b5d700cc231ad655dd6a605216f6d5f6f5f1c5f43f1c9f29b2ffd872fd2bb7b4956359d75be44bfbaedd7353d8f3ccf5852662c215884dbf5936edd48

        • \Users\Admin\AppData\Local\Temp\RarSFX0\loadwg.exe

          Filesize

          334KB

          MD5

          bae3eb4767317ba6eb0805347f32c66c

          SHA1

          644ae6e107658e478f15dfce652fcb0e4e493af6

          SHA256

          a982cdae025294cc536d2d429205151e6934dd54b2850af220bed6f58f4c1dfb

          SHA512

          01ce521798e583be251839f53397b104b35aec8800e282496196824163138efc866f553805c330bdf5653b16c215eafb07a0ea08a0fb122a28f0d4d72298160e

        • \Users\Admin\AppData\Local\Temp\RarSFX0\loadwg.exe

          Filesize

          334KB

          MD5

          bae3eb4767317ba6eb0805347f32c66c

          SHA1

          644ae6e107658e478f15dfce652fcb0e4e493af6

          SHA256

          a982cdae025294cc536d2d429205151e6934dd54b2850af220bed6f58f4c1dfb

          SHA512

          01ce521798e583be251839f53397b104b35aec8800e282496196824163138efc866f553805c330bdf5653b16c215eafb07a0ea08a0fb122a28f0d4d72298160e

        • \Windows\inf\xxy.dll

          Filesize

          23KB

          MD5

          b42620f56d958611152358b3e0092df3

          SHA1

          a185f6e21ad591715f5d2a061a82e9e3400e6a14

          SHA256

          c91453f20030eaf2811cd3ae5bbcd8cf8f5e0da111cd61148d68781e1f63472c

          SHA512

          dc4b210bf66a5b28d2638e7a6d5f9ec1faebc37bcc22542f7313e16547e7633cf6488e574ea33beabe6513f4c070ed90ccdb97cce8de61e5e803fe1496b0d7ba

        • \Windows\inf\xxy.dll

          Filesize

          23KB

          MD5

          b42620f56d958611152358b3e0092df3

          SHA1

          a185f6e21ad591715f5d2a061a82e9e3400e6a14

          SHA256

          c91453f20030eaf2811cd3ae5bbcd8cf8f5e0da111cd61148d68781e1f63472c

          SHA512

          dc4b210bf66a5b28d2638e7a6d5f9ec1faebc37bcc22542f7313e16547e7633cf6488e574ea33beabe6513f4c070ed90ccdb97cce8de61e5e803fe1496b0d7ba

        • \Windows\inf\xxy.dll

          Filesize

          23KB

          MD5

          b42620f56d958611152358b3e0092df3

          SHA1

          a185f6e21ad591715f5d2a061a82e9e3400e6a14

          SHA256

          c91453f20030eaf2811cd3ae5bbcd8cf8f5e0da111cd61148d68781e1f63472c

          SHA512

          dc4b210bf66a5b28d2638e7a6d5f9ec1faebc37bcc22542f7313e16547e7633cf6488e574ea33beabe6513f4c070ed90ccdb97cce8de61e5e803fe1496b0d7ba

        • memory/1012-61-0x0000000003080000-0x000000000312C000-memory.dmp

          Filesize

          688KB

        • memory/1012-54-0x00000000763F1000-0x00000000763F3000-memory.dmp

          Filesize

          8KB

        • memory/1160-70-0x0000000000220000-0x000000000022C000-memory.dmp

          Filesize

          48KB

        • memory/1360-62-0x0000000000400000-0x00000000004AC000-memory.dmp

          Filesize

          688KB

        • memory/1360-63-0x0000000000400000-0x00000000004AC000-memory.dmp

          Filesize

          688KB

        • memory/1360-73-0x0000000002740000-0x000000000274C000-memory.dmp

          Filesize

          48KB