Analysis

  • max time kernel
    46s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 23:20

General

  • Target

    e8eaf42688c3c7114032c03275b44d7272b084ea565c642f05d40cf1fbb93d1b.exe

  • Size

    559KB

  • MD5

    0b6f019dfba8b53f8b53000e738f7000

  • SHA1

    779e1a5f6f881c68605fcb5954fd64a93e45d835

  • SHA256

    e8eaf42688c3c7114032c03275b44d7272b084ea565c642f05d40cf1fbb93d1b

  • SHA512

    f051606872dc6f38d8c354b62235093f78e6652b32a4e5240704e7ec84412307389408989ef09f71ef1b6b368e32f38ebf030b4ca3ed58f6581633a78f70da7c

  • SSDEEP

    12288:DEvln7lT4VXb+XOeYnghAHRWC4DR3aJc9VI1kfgjdkAx:QvrTmXaXOebUsR3cc9VjgjT

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8eaf42688c3c7114032c03275b44d7272b084ea565c642f05d40cf1fbb93d1b.exe
    "C:\Users\Admin\AppData\Local\Temp\e8eaf42688c3c7114032c03275b44d7272b084ea565c642f05d40cf1fbb93d1b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Roaming\mrf.exe
      "C:\Users\Admin\AppData\Roaming\mrf.exe"
      2⤵
      • Executes dropped EXE
      PID:612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrf.exe

    Filesize

    559KB

    MD5

    0b6f019dfba8b53f8b53000e738f7000

    SHA1

    779e1a5f6f881c68605fcb5954fd64a93e45d835

    SHA256

    e8eaf42688c3c7114032c03275b44d7272b084ea565c642f05d40cf1fbb93d1b

    SHA512

    f051606872dc6f38d8c354b62235093f78e6652b32a4e5240704e7ec84412307389408989ef09f71ef1b6b368e32f38ebf030b4ca3ed58f6581633a78f70da7c

  • \Users\Admin\AppData\Roaming\mrf.exe

    Filesize

    559KB

    MD5

    0b6f019dfba8b53f8b53000e738f7000

    SHA1

    779e1a5f6f881c68605fcb5954fd64a93e45d835

    SHA256

    e8eaf42688c3c7114032c03275b44d7272b084ea565c642f05d40cf1fbb93d1b

    SHA512

    f051606872dc6f38d8c354b62235093f78e6652b32a4e5240704e7ec84412307389408989ef09f71ef1b6b368e32f38ebf030b4ca3ed58f6581633a78f70da7c

  • \Users\Admin\AppData\Roaming\mrf.exe

    Filesize

    559KB

    MD5

    0b6f019dfba8b53f8b53000e738f7000

    SHA1

    779e1a5f6f881c68605fcb5954fd64a93e45d835

    SHA256

    e8eaf42688c3c7114032c03275b44d7272b084ea565c642f05d40cf1fbb93d1b

    SHA512

    f051606872dc6f38d8c354b62235093f78e6652b32a4e5240704e7ec84412307389408989ef09f71ef1b6b368e32f38ebf030b4ca3ed58f6581633a78f70da7c

  • memory/2020-54-0x00000000756B1000-0x00000000756B3000-memory.dmp

    Filesize

    8KB