Analysis

  • max time kernel
    164s
  • max time network
    64s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 23:12

General

  • Target

    cb90ae9b9eb53456847cba73293ba9a39f9182384155802813f1f10fbf452d8b.exe

  • Size

    216KB

  • MD5

    434cf148c899e6d8b28ced352ccd06fb

  • SHA1

    f811f3ef90f987e4d22aae2a6faac80efd441ee5

  • SHA256

    cb90ae9b9eb53456847cba73293ba9a39f9182384155802813f1f10fbf452d8b

  • SHA512

    788cc39260ec49d0e3ed7bad34e75c80d8473df8da01c230eaa76767062e2eb354bdd9179171bc3d3e7e3e4f26be752150213f8aa336c7d9f4cf9ac3ce3bba71

  • SSDEEP

    6144:u2hrbA1x5PZZKnvmb7/D26g4upEoadEXUqgVWLIg7gd:7A1x5PZZKnvmb7/D26GadEXUqgDg7gd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb90ae9b9eb53456847cba73293ba9a39f9182384155802813f1f10fbf452d8b.exe
    "C:\Users\Admin\AppData\Local\Temp\cb90ae9b9eb53456847cba73293ba9a39f9182384155802813f1f10fbf452d8b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\gbsoc.exe
      "C:\Users\Admin\gbsoc.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:868

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gbsoc.exe

    Filesize

    216KB

    MD5

    bb17667558535280aa8f3f896358fefb

    SHA1

    dd92795d7aee9754b92a6ee919c5ace390d177f6

    SHA256

    b27de6787e6318b483e98c4ef251d16a7d5d50f8e9c64664c8cc4ce37cda48fd

    SHA512

    e7726366bb6af734f9efce9aa8be05d25d3354d42255b9892de0383c245b6fd8d5cfd7d0164bd3be6b99ea979c12ddeda7ca2c8f4dd9f9613472ab194a7c81a1

  • C:\Users\Admin\gbsoc.exe

    Filesize

    216KB

    MD5

    bb17667558535280aa8f3f896358fefb

    SHA1

    dd92795d7aee9754b92a6ee919c5ace390d177f6

    SHA256

    b27de6787e6318b483e98c4ef251d16a7d5d50f8e9c64664c8cc4ce37cda48fd

    SHA512

    e7726366bb6af734f9efce9aa8be05d25d3354d42255b9892de0383c245b6fd8d5cfd7d0164bd3be6b99ea979c12ddeda7ca2c8f4dd9f9613472ab194a7c81a1

  • \Users\Admin\gbsoc.exe

    Filesize

    216KB

    MD5

    bb17667558535280aa8f3f896358fefb

    SHA1

    dd92795d7aee9754b92a6ee919c5ace390d177f6

    SHA256

    b27de6787e6318b483e98c4ef251d16a7d5d50f8e9c64664c8cc4ce37cda48fd

    SHA512

    e7726366bb6af734f9efce9aa8be05d25d3354d42255b9892de0383c245b6fd8d5cfd7d0164bd3be6b99ea979c12ddeda7ca2c8f4dd9f9613472ab194a7c81a1

  • \Users\Admin\gbsoc.exe

    Filesize

    216KB

    MD5

    bb17667558535280aa8f3f896358fefb

    SHA1

    dd92795d7aee9754b92a6ee919c5ace390d177f6

    SHA256

    b27de6787e6318b483e98c4ef251d16a7d5d50f8e9c64664c8cc4ce37cda48fd

    SHA512

    e7726366bb6af734f9efce9aa8be05d25d3354d42255b9892de0383c245b6fd8d5cfd7d0164bd3be6b99ea979c12ddeda7ca2c8f4dd9f9613472ab194a7c81a1

  • memory/1728-56-0x0000000076091000-0x0000000076093000-memory.dmp

    Filesize

    8KB