Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 15:19

General

  • Target

    2de5b5a81a8bf1b61309a37c46dc99a6ac9cbe1274ea8960424bed24a7a39fd5.exe

  • Size

    187KB

  • MD5

    7ca3e9f3261abea3f96862964f4b700c

  • SHA1

    be69caf10a63f04285126cdcb443513c16134877

  • SHA256

    2de5b5a81a8bf1b61309a37c46dc99a6ac9cbe1274ea8960424bed24a7a39fd5

  • SHA512

    e2ce5ed623909948bb61f2a153878e7c39e135982743f093ff73bf8b91e6f9c907f23e9f5f023fca7589c84dac722293b7f33aec567a2c9a7c2a33951b2a3a0d

  • SSDEEP

    3072:sahF1FSUt6X7+BUlxpQHXgsFYx+ewNArVQ7k9aG4pH7NvpOzl6pp9SgXWEZu+YPZ:saH1Frt66yA3XCwNAyk9TY7NvpOBW3+r

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2de5b5a81a8bf1b61309a37c46dc99a6ac9cbe1274ea8960424bed24a7a39fd5.exe
    "C:\Users\Admin\AppData\Local\Temp\2de5b5a81a8bf1b61309a37c46dc99a6ac9cbe1274ea8960424bed24a7a39fd5.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1760
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\2de5b5a81a8bf1b61309a37c46dc99a6ac9cbe1274ea8960424bed24a7a39fd5.exe" "2de5b5a81a8bf1b61309a37c46dc99a6ac9cbe1274ea8960424bed24a7a39fd5.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:752

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1760-54-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-57-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/1760-58-0x0000000000020000-0x0000000000023000-memory.dmp

          Filesize

          12KB

        • memory/1760-59-0x0000000075C51000-0x0000000075C53000-memory.dmp

          Filesize

          8KB

        • memory/1760-60-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-61-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-62-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-63-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-64-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-65-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-66-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-67-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-68-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-69-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-70-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-71-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-72-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-73-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-74-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-76-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-75-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-77-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-78-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-79-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-81-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-80-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-82-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-83-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-85-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-84-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-88-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-87-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-86-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-89-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-90-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-91-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-92-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-93-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-94-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-95-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-96-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-98-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-97-0x00000000741F0000-0x000000007479B000-memory.dmp

          Filesize

          5.7MB

        • memory/1760-99-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-100-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-101-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-102-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-103-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-104-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-106-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-109-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-112-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-113-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-115-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-117-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-120-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-119-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-118-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-116-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-114-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-111-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-110-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-108-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-107-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-105-0x0000000000240000-0x000000000026E000-memory.dmp

          Filesize

          184KB

        • memory/1760-145-0x00000000741F0000-0x000000007479B000-memory.dmp

          Filesize

          5.7MB