Analysis

  • max time kernel
    139s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 12:29

General

  • Target

    ca5c2f6c3b331f9f88afeb36181227f45fcfb73a5ee87e7780f69f1de8bc1d85.exe

  • Size

    1.2MB

  • MD5

    69fbc9d0d83155989f8860af41ab3fa0

  • SHA1

    8f60924f62e509f4711b2c58a3ce2fe00d859838

  • SHA256

    ca5c2f6c3b331f9f88afeb36181227f45fcfb73a5ee87e7780f69f1de8bc1d85

  • SHA512

    92ff63a3ef089a45952b54ea463a620ce27b164c5e8675576d70f4feb2c951156d1cc9ff589eed39e4365eaf3d59bc072b6c03eed059b42f4083ed9bc9bc3861

  • SSDEEP

    24576:VT0sTg6g8vjxs8SbUzjo2ghcisSbW9XtRg/PbonLjR3pXBJrDdd5tikQCN:VT7kn8d1Sbk7isB9Xibof1pxppd5tikx

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca5c2f6c3b331f9f88afeb36181227f45fcfb73a5ee87e7780f69f1de8bc1d85.exe
    "C:\Users\Admin\AppData\Local\Temp\ca5c2f6c3b331f9f88afeb36181227f45fcfb73a5ee87e7780f69f1de8bc1d85.exe"
    1⤵
    • Loads dropped DLL
    PID:5100

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsj1D2F.tmp\InstallOptions.dll

          Filesize

          14KB

          MD5

          325b008aec81e5aaa57096f05d4212b5

          SHA1

          27a2d89747a20305b6518438eff5b9f57f7df5c3

          SHA256

          c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

          SHA512

          18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

        • C:\Users\Admin\AppData\Local\Temp\nsj1D2F.tmp\NSISdl.dll

          Filesize

          14KB

          MD5

          a5f8399a743ab7f9c88c645c35b1ebb5

          SHA1

          168f3c158913b0367bf79fa413357fbe97018191

          SHA256

          dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

          SHA512

          824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977