Analysis

  • max time kernel
    196s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2022 14:06

General

  • Target

    deedb59bcec2385234447ea66347b59f8b0aa8464f8cbb7d2eea5a28b1b25590.exe

  • Size

    48KB

  • MD5

    f3194cd1dfe52a3b1ddae58272aaedd8

  • SHA1

    d1ef93df2deb8983b65d3e8e72f91b4e1bcae879

  • SHA256

    deedb59bcec2385234447ea66347b59f8b0aa8464f8cbb7d2eea5a28b1b25590

  • SHA512

    d787655af0d3a39ff9d8f6b5077962763be5f6eed851019d45c15171f805ae6b7d1dcf09c60bf0daa4ecf2c49bafe1ae9fc3c9b83d4d435ae44925954137916d

  • SSDEEP

    768:6buDiv3N+KjGgZCH6yku7oGeZsQT6rd/tjtP19DWsWqFUUEhJJMXLSi2uF2uh:hiPMIGIdtCo0Ftpt3yZzJJoLSs

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\deedb59bcec2385234447ea66347b59f8b0aa8464f8cbb7d2eea5a28b1b25590.exe
    "C:\Users\Admin\AppData\Local\Temp\deedb59bcec2385234447ea66347b59f8b0aa8464f8cbb7d2eea5a28b1b25590.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4344
    • C:\Users\Admin\AppData\Local\Temp\juupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\juupdate.exe" "C:\Users\Admin\AppData\Local\Temp\master.kvh"
      2⤵
      • Executes dropped EXE
      PID:4896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\juupdate.exe

    Filesize

    144KB

    MD5

    ff00e0480075b095948000bdc66e81f0

    SHA1

    c2326cc50a739d3bc512bb65a24d42f1cde745c9

    SHA256

    8c767077bb410f95b1db237b31f4f6e1512c78c1f0120de3f215b501f6d1c7ea

    SHA512

    3a38e62dcb925411bc037335e46dfdd895c12a52ac43c47ef38db42d41d8358dfc2b1081a361367911d60ec5a3350ca734cf70ad57b21d39b23cfdec35b0aced

  • C:\Users\Admin\AppData\Local\Temp\juupdate.exe

    Filesize

    144KB

    MD5

    ff00e0480075b095948000bdc66e81f0

    SHA1

    c2326cc50a739d3bc512bb65a24d42f1cde745c9

    SHA256

    8c767077bb410f95b1db237b31f4f6e1512c78c1f0120de3f215b501f6d1c7ea

    SHA512

    3a38e62dcb925411bc037335e46dfdd895c12a52ac43c47ef38db42d41d8358dfc2b1081a361367911d60ec5a3350ca734cf70ad57b21d39b23cfdec35b0aced

  • C:\Users\Admin\AppData\Local\Temp\master.kvh

    Filesize

    9KB

    MD5

    e710026dda5d338a696475ccdad2eef1

    SHA1

    79985f4bc32adab9d1133846ac50445ff9e2c5da

    SHA256

    2adb4fdd59322c08222c6c73b6ae69dd22390b30d3ba50f869bf939e560c72f9

    SHA512

    e4f6c2acff673f6c0ca8d193000fe37cd000f9f2ebd7f480220d5c93629cbf1e2129fe73ffac47b2a6cc52132ced3650fece0937e086ca9f3ffb331b5d8e4490

  • memory/4344-132-0x0000000000400000-0x00000000007AC02D-memory.dmp

    Filesize

    3.7MB

  • memory/4344-133-0x0000000000400000-0x00000000007AC02D-memory.dmp

    Filesize

    3.7MB

  • memory/4344-138-0x0000000000400000-0x00000000007AC02D-memory.dmp

    Filesize

    3.7MB