Analysis

  • max time kernel
    94s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 07:42

General

  • Target

    8db371b0117f7acd7f2d6777dc3c314b6221890a680af4941022f3f24c8ebd73.exe

  • Size

    1.3MB

  • MD5

    f432863766d8603cffb89f00ad20572e

  • SHA1

    8bb5ed4975b4b503c6487e720f11c25a7b25c00e

  • SHA256

    8db371b0117f7acd7f2d6777dc3c314b6221890a680af4941022f3f24c8ebd73

  • SHA512

    df647d3c9c3b26f7112c8bcabc777f73638a6834d5301a68ce4c7db5b219cb6c691135574d3a97c27e877eda5dd2f46820095b9bc3f7ac8ba2469cb1a8ac336e

  • SSDEEP

    24576:OO/Bcr8491sB+JslrJHpGObUVsdmiycNoTodoV7vuVcoZnmdLP9huspc//////V:b/BcZr8rbGObUW/9oEdYvuVcoZnmdLPQ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8db371b0117f7acd7f2d6777dc3c314b6221890a680af4941022f3f24c8ebd73.exe
    "C:\Users\Admin\AppData\Local\Temp\8db371b0117f7acd7f2d6777dc3c314b6221890a680af4941022f3f24c8ebd73.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Users\Admin\AppData\Local\Temp\hrtv.exe
      C:\Users\Admin\AppData\Local\Temp\hrtv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:5028
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\9.2\autorun.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\9.2\autorun.exe
        3⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2160
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4f4 0x4f8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4312

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hrtv.exe

    Filesize

    1.2MB

    MD5

    debcfc8871da6395b35c198b37a4e4c8

    SHA1

    17e35ac67960887c10366a53822a41529cf41dcd

    SHA256

    b6cf152334ebe20ce578ac566939eaa92e3e82caa137ab245d2a01277ca7948e

    SHA512

    54548a98718494d89a27eb153471c4586fffb479b81ba6e0d4fbb64046c1f72b2326634e5e987369d139f41bd04a5c88507291c63f61b0b9109dbe1ddd7bfa01

  • C:\Users\Admin\AppData\Local\Temp\hrtv.exe

    Filesize

    1.2MB

    MD5

    debcfc8871da6395b35c198b37a4e4c8

    SHA1

    17e35ac67960887c10366a53822a41529cf41dcd

    SHA256

    b6cf152334ebe20ce578ac566939eaa92e3e82caa137ab245d2a01277ca7948e

    SHA512

    54548a98718494d89a27eb153471c4586fffb479b81ba6e0d4fbb64046c1f72b2326634e5e987369d139f41bd04a5c88507291c63f61b0b9109dbe1ddd7bfa01

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

  • C:\Users\Admin\AppData\Local\Temp\nslA4F0.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

  • C:\Users\Admin\AppData\Local\Temp\nsmA762.tmp\Banner.dll

    Filesize

    4KB

    MD5

    5ce60830e6db34a33f12be5018b21ca2

    SHA1

    1a4f855b358884d0c67053ec606a5a68aadf75b8

    SHA256

    8a039174ce882841a97df0871f94e22ebfc5111ac614eb05baf10cd1fd5d8c1a

    SHA512

    e6590fc8c365e98c6eb59ffcfab6931423b0603ec68b5c10f38004b879c5f3af3ee05d89b88f6fc480236abc9af4945e3146e9017bbd94ca8deac02145b7d903

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\9.2\AutoPlay\Buttons\1_438.btn

    Filesize

    5KB

    MD5

    a606337058f048b4c0057b6ac2e76d55

    SHA1

    516b3803ccda6f0a25a7bf362501aced809de701

    SHA256

    8f572a3a99f4074b86744d3c01fad8f0b8aabd94681ef9b9a88f7ed3a0b42a47

    SHA512

    66f8e2253df4f06e07dff81b2a84ec9b395b3ff30638bbe86f90bb4b0d7c7f3fd8a7ab5c7919cc14bc07dbd613e069ce7b817755c72f1fd5cf081ab93911e4d6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\9.2\AutoPlay\Images\1.JPG

    Filesize

    24KB

    MD5

    cd65d5445205a3ef0b67d4aa5d62c239

    SHA1

    b484de5e694a98f1def632799bc1cfd0c1bd7b11

    SHA256

    313c3e80a6c6414db46d0170307ad0a755ef737f263bddf0f66b6accb4d5d590

    SHA512

    7fe107535a968f3b7362661087e567177636f4fab8e5bbcfdbdc5554cd29d56198b4caec31eb9d1603abd7e8e622008b1266a441b0916e1ca920f0a57f7f5b5d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\9.2\AutoPlay\Images\logo_1.png

    Filesize

    7KB

    MD5

    15090cfd5bacffbfde39ef9ac4a9d2f8

    SHA1

    4c72706ebf632f1ab951b76803cf17a65de3652a

    SHA256

    9e890ecf190eae6ea923610a9766dd4a20426d98cbb251fc46af143c54b959d6

    SHA512

    4b620d094e36e9f11225320e02aa7a7eaea11e6023298b2a1d0c6439721a0522f1446a2c7e80d3f76eb4aa3c642ac2cfa2d85ad3fe322c27abb48d38203351e1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\9.2\AutoPlay\autorun.cdd

    Filesize

    107KB

    MD5

    5e16bb5e421bebc6e987a5c55e70a68d

    SHA1

    df62053c3654202db146eca99fa11ca67893af01

    SHA256

    c5fa8de7f54a6510ea67f3035f2babd82a491f833868c72188003b6ad960ade4

    SHA512

    c7b30064c39b82913f2cd89e51820c685a2b540018e7a5fbce5765d58d4b8def7d412626420e3742b958e56541ae87d8a22c9725deae2d4abf49205b8a16e3fe

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\9.2\autorun.exe

    Filesize

    2.7MB

    MD5

    c341f1cb4da8c82e722f9dea8e5d8a37

    SHA1

    5560b99e73aeed0dd41cff07ecae89b704000aee

    SHA256

    43e27c8349eb164ed1a9ed2a6e6925dd5102ca53eb31046c8290d384de1ca44a

    SHA512

    7e3d642788a0ef2d844fae6396e5876b2d4555f007feb70246b04803839611ee2f36a4a328d58ab13e9f187d709315e0751e207c346b78bc1454745e147128f9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\9.2\autorun.exe

    Filesize

    2.7MB

    MD5

    c341f1cb4da8c82e722f9dea8e5d8a37

    SHA1

    5560b99e73aeed0dd41cff07ecae89b704000aee

    SHA256

    43e27c8349eb164ed1a9ed2a6e6925dd5102ca53eb31046c8290d384de1ca44a

    SHA512

    7e3d642788a0ef2d844fae6396e5876b2d4555f007feb70246b04803839611ee2f36a4a328d58ab13e9f187d709315e0751e207c346b78bc1454745e147128f9