Analysis

  • max time kernel
    156s
  • max time network
    202s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 12:59

General

  • Target

    af296826502e3b7b39c429c8e6fd110ed37cb9fc1603548fa24d88f22fdf3bf5.exe

  • Size

    302KB

  • MD5

    805383c8e8a29e7942357a598adb6d2e

  • SHA1

    8a95c2941e87072bc84cee3f696288214a26bb7d

  • SHA256

    af296826502e3b7b39c429c8e6fd110ed37cb9fc1603548fa24d88f22fdf3bf5

  • SHA512

    590e1b0b0548a54b5207c389999ad1c350736ddc8999e3dd6e54a49a8604403fb6f12e1a83101d7747ee8d580442ef95635575fc789897a975ba963e675ce539

  • SSDEEP

    6144:F+LjhEB1aWggNOpqY8zzBZ9iEVXZZNTlCdXxiIcYst:F+Llmdgg4nyXZZZNT6hX0t

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af296826502e3b7b39c429c8e6fd110ed37cb9fc1603548fa24d88f22fdf3bf5.exe
    "C:\Users\Admin\AppData\Local\Temp\af296826502e3b7b39c429c8e6fd110ed37cb9fc1603548fa24d88f22fdf3bf5.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1812

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\dfsBEED.tmp

          Filesize

          608KB

          MD5

          6ad886fddcec2a8bd3d7ff4b18bbdf04

          SHA1

          35bea8f3e88d61c37fee34411f245ba1204f27e1

          SHA256

          e31480f82305ffd0cbe33596006405ad9cc6bcbd91143ac236a180500a1996f1

          SHA512

          64c1e29aafc55e05d22dd8c3ede6b0aa3a09438c7074f699cdfed999b5197ab46466bf796e00e4c99236200d295e39fec57f1e8a7c80223fd478264a84954296

        • \Users\Admin\AppData\Local\Temp\dfsBEED.tmp

          Filesize

          608KB

          MD5

          6ad886fddcec2a8bd3d7ff4b18bbdf04

          SHA1

          35bea8f3e88d61c37fee34411f245ba1204f27e1

          SHA256

          e31480f82305ffd0cbe33596006405ad9cc6bcbd91143ac236a180500a1996f1

          SHA512

          64c1e29aafc55e05d22dd8c3ede6b0aa3a09438c7074f699cdfed999b5197ab46466bf796e00e4c99236200d295e39fec57f1e8a7c80223fd478264a84954296

        • memory/1812-56-0x00000000010F0000-0x000000000118E000-memory.dmp

          Filesize

          632KB

        • memory/1812-57-0x00000000013C0000-0x0000000001486000-memory.dmp

          Filesize

          792KB

        • memory/1812-58-0x00000000000F0000-0x00000000000F3000-memory.dmp

          Filesize

          12KB

        • memory/1812-59-0x0000000000730000-0x000000000073A000-memory.dmp

          Filesize

          40KB

        • memory/1812-60-0x00000000753F1000-0x00000000753F3000-memory.dmp

          Filesize

          8KB

        • memory/1812-61-0x0000000004987000-0x0000000004998000-memory.dmp

          Filesize

          68KB

        • memory/1812-62-0x00000000000F0000-0x00000000000F3000-memory.dmp

          Filesize

          12KB

        • memory/1812-63-0x000000000A650000-0x000000000ADF6000-memory.dmp

          Filesize

          7.6MB