Analysis

  • max time kernel
    5s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 13:34

General

  • Target

    af16f1f977bfdaaad9d1dced3c2fbe953a32b00c7717e9ff03a797171b18c3cd.exe

  • Size

    339KB

  • MD5

    1f7c16598dc4df082383eb3cf1606c65

  • SHA1

    16be25fd3a016f3d2a4ba900174f8f0f5150872d

  • SHA256

    af16f1f977bfdaaad9d1dced3c2fbe953a32b00c7717e9ff03a797171b18c3cd

  • SHA512

    112e3ef03ddbbed8e4a6a281088f3ff4ca520e3fdb46309841ca776700f08c0330d731177afc4705b502e592e5ec53422b60624549385258e87964de59a2448e

  • SSDEEP

    6144:wFJ0F4L52W+LRGxoxtM4PgLkrrN4d2AP/8zbsHCwxSsLk24aqM8:p4eLoxG6ygLnkIEzb5wo7S8

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af16f1f977bfdaaad9d1dced3c2fbe953a32b00c7717e9ff03a797171b18c3cd.exe
    "C:\Users\Admin\AppData\Local\Temp\af16f1f977bfdaaad9d1dced3c2fbe953a32b00c7717e9ff03a797171b18c3cd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\beeigbifea.exe
      C:\Users\Admin\AppData\Local\Temp\beeigbifea.exe 6)1)6)0)3)2)2)3)7)2)4 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81670482630.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1444
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81670482630.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2032
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81670482630.txt bios get version
        3⤵
          PID:1956
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81670482630.txt bios get version
          3⤵
            PID:1616
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81670482630.txt bios get version
            3⤵
              PID:540
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 372
              3⤵
              • Loads dropped DLL
              • Program crash
              PID:1332

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\81670482630.txt

                Filesize

                66B

                MD5

                9025468f85256136f923096b01375964

                SHA1

                7fcd174999661594fa5f88890ffb195e9858cc52

                SHA256

                d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

                SHA512

                92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

              • C:\Users\Admin\AppData\Local\Temp\81670482630.txt

                Filesize

                58B

                MD5

                dd876faf0fd44a5fab3e82368e2e8b15

                SHA1

                01b04083fa278dda3a81705ca5abcfee487a3c90

                SHA256

                5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

                SHA512

                e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

              • C:\Users\Admin\AppData\Local\Temp\81670482630.txt

                Filesize

                58B

                MD5

                dd876faf0fd44a5fab3e82368e2e8b15

                SHA1

                01b04083fa278dda3a81705ca5abcfee487a3c90

                SHA256

                5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

                SHA512

                e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

              • C:\Users\Admin\AppData\Local\Temp\81670482630.txt

                Filesize

                58B

                MD5

                dd876faf0fd44a5fab3e82368e2e8b15

                SHA1

                01b04083fa278dda3a81705ca5abcfee487a3c90

                SHA256

                5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

                SHA512

                e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

              • C:\Users\Admin\AppData\Local\Temp\81670482630.txt

                Filesize

                58B

                MD5

                dd876faf0fd44a5fab3e82368e2e8b15

                SHA1

                01b04083fa278dda3a81705ca5abcfee487a3c90

                SHA256

                5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

                SHA512

                e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

              • C:\Users\Admin\AppData\Local\Temp\beeigbifea.exe

                Filesize

                538KB

                MD5

                b4ccd69436b04ed974843c769154e052

                SHA1

                97ebcd3dd8a5779f4edb4de9351cd7a16d333adb

                SHA256

                27c9feb6ac162bbc0fad8b136a43fdf8093e87132d8a610d7977c62fcf0fc98e

                SHA512

                fa63827a2f0172fd58b86532e08e5eb8c7c61b6dca7d957716e073aa8fe1e364b9a3bbd2487ae7a661ff723d02476a3a86cba56680c7f184ce50328e4975bf68

              • \Users\Admin\AppData\Local\Temp\beeigbifea.exe

                Filesize

                538KB

                MD5

                b4ccd69436b04ed974843c769154e052

                SHA1

                97ebcd3dd8a5779f4edb4de9351cd7a16d333adb

                SHA256

                27c9feb6ac162bbc0fad8b136a43fdf8093e87132d8a610d7977c62fcf0fc98e

                SHA512

                fa63827a2f0172fd58b86532e08e5eb8c7c61b6dca7d957716e073aa8fe1e364b9a3bbd2487ae7a661ff723d02476a3a86cba56680c7f184ce50328e4975bf68

              • \Users\Admin\AppData\Local\Temp\beeigbifea.exe

                Filesize

                538KB

                MD5

                b4ccd69436b04ed974843c769154e052

                SHA1

                97ebcd3dd8a5779f4edb4de9351cd7a16d333adb

                SHA256

                27c9feb6ac162bbc0fad8b136a43fdf8093e87132d8a610d7977c62fcf0fc98e

                SHA512

                fa63827a2f0172fd58b86532e08e5eb8c7c61b6dca7d957716e073aa8fe1e364b9a3bbd2487ae7a661ff723d02476a3a86cba56680c7f184ce50328e4975bf68

              • \Users\Admin\AppData\Local\Temp\beeigbifea.exe

                Filesize

                538KB

                MD5

                b4ccd69436b04ed974843c769154e052

                SHA1

                97ebcd3dd8a5779f4edb4de9351cd7a16d333adb

                SHA256

                27c9feb6ac162bbc0fad8b136a43fdf8093e87132d8a610d7977c62fcf0fc98e

                SHA512

                fa63827a2f0172fd58b86532e08e5eb8c7c61b6dca7d957716e073aa8fe1e364b9a3bbd2487ae7a661ff723d02476a3a86cba56680c7f184ce50328e4975bf68

              • \Users\Admin\AppData\Local\Temp\beeigbifea.exe

                Filesize

                538KB

                MD5

                b4ccd69436b04ed974843c769154e052

                SHA1

                97ebcd3dd8a5779f4edb4de9351cd7a16d333adb

                SHA256

                27c9feb6ac162bbc0fad8b136a43fdf8093e87132d8a610d7977c62fcf0fc98e

                SHA512

                fa63827a2f0172fd58b86532e08e5eb8c7c61b6dca7d957716e073aa8fe1e364b9a3bbd2487ae7a661ff723d02476a3a86cba56680c7f184ce50328e4975bf68

              • \Users\Admin\AppData\Local\Temp\beeigbifea.exe

                Filesize

                538KB

                MD5

                b4ccd69436b04ed974843c769154e052

                SHA1

                97ebcd3dd8a5779f4edb4de9351cd7a16d333adb

                SHA256

                27c9feb6ac162bbc0fad8b136a43fdf8093e87132d8a610d7977c62fcf0fc98e

                SHA512

                fa63827a2f0172fd58b86532e08e5eb8c7c61b6dca7d957716e073aa8fe1e364b9a3bbd2487ae7a661ff723d02476a3a86cba56680c7f184ce50328e4975bf68

              • memory/1260-54-0x0000000075C41000-0x0000000075C43000-memory.dmp

                Filesize

                8KB