Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 14:42

General

  • Target

    a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe

  • Size

    65KB

  • MD5

    28d83f66f75200ea00912691a493914c

  • SHA1

    a90020dce759e498ad899449159f635a0f16a07f

  • SHA256

    a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28

  • SHA512

    26368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a

  • SSDEEP

    1536:wD0PSuUXJQFDbWw/rZoVGGbNSY+A37feaCMJDmYb:SzqDbLrZoccSDADeak2

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe
    "C:\Users\Admin\AppData\Local\Temp\a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe
      "C:\Users\Admin\AppData\Local\Temp\a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe"
      2⤵
      • Drops file in Drivers directory
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\SysWOW64\mancstmgr.exe
        "C:\Windows\system32\mancstmgr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1776
        • C:\Windows\SysWOW64\mancstmgr.exe
          "C:\Windows\SysWOW64\mancstmgr.exe"
          4⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1876
          • C:\Windows\SysWOW64\mancstmgr.exe
            "C:\Windows\system32\mancstmgr.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1816
            • C:\Windows\SysWOW64\mancstmgr.exe
              "C:\Windows\SysWOW64\mancstmgr.exe"
              6⤵
                PID:964
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\MANCST~1.EXE > nul
              5⤵
                PID:304
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A0625D~1.EXE > nul
            3⤵
            • Deletes itself
            PID:1328

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\mancstmgr.exe

        Filesize

        65KB

        MD5

        28d83f66f75200ea00912691a493914c

        SHA1

        a90020dce759e498ad899449159f635a0f16a07f

        SHA256

        a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28

        SHA512

        26368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a

      • C:\Windows\SysWOW64\mancstmgr.exe

        Filesize

        65KB

        MD5

        28d83f66f75200ea00912691a493914c

        SHA1

        a90020dce759e498ad899449159f635a0f16a07f

        SHA256

        a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28

        SHA512

        26368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a

      • C:\Windows\SysWOW64\mancstmgr.exe

        Filesize

        65KB

        MD5

        28d83f66f75200ea00912691a493914c

        SHA1

        a90020dce759e498ad899449159f635a0f16a07f

        SHA256

        a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28

        SHA512

        26368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a

      • C:\Windows\SysWOW64\mancstmgr.exe

        Filesize

        65KB

        MD5

        28d83f66f75200ea00912691a493914c

        SHA1

        a90020dce759e498ad899449159f635a0f16a07f

        SHA256

        a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28

        SHA512

        26368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a

      • C:\Windows\system32\drivers\etc\hosts

        Filesize

        2KB

        MD5

        e70a6bb213f4e35bc7ba89512fc78396

        SHA1

        00e76893d4e3b73ec668f4670e2e154bd567ff23

        SHA256

        80ad1dcfb41f58b21cfbbaa1a35bf0f85034d91e5f886eec44e2a4c3a63b6d85

        SHA512

        45bc02e515132ab698fd1c52ecf59c7d3b629f87dcd5be214548ea27f3b056f0c4ad77beb385c3491b05bcc6c91cf6020552096108a2d928ea7faab4bf14c7c8

      • \Windows\SysWOW64\mancstmgr.exe

        Filesize

        65KB

        MD5

        28d83f66f75200ea00912691a493914c

        SHA1

        a90020dce759e498ad899449159f635a0f16a07f

        SHA256

        a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28

        SHA512

        26368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a

      • \Windows\SysWOW64\mancstmgr.exe

        Filesize

        65KB

        MD5

        28d83f66f75200ea00912691a493914c

        SHA1

        a90020dce759e498ad899449159f635a0f16a07f

        SHA256

        a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28

        SHA512

        26368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a

      • \Windows\SysWOW64\mancstmgr.exe

        Filesize

        65KB

        MD5

        28d83f66f75200ea00912691a493914c

        SHA1

        a90020dce759e498ad899449159f635a0f16a07f

        SHA256

        a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28

        SHA512

        26368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a

      • \Windows\SysWOW64\mancstmgr.exe

        Filesize

        65KB

        MD5

        28d83f66f75200ea00912691a493914c

        SHA1

        a90020dce759e498ad899449159f635a0f16a07f

        SHA256

        a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28

        SHA512

        26368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a

      • memory/304-105-0x0000000000000000-mapping.dmp

      • memory/1184-68-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/1184-54-0x0000000075A11000-0x0000000075A13000-memory.dmp

        Filesize

        8KB

      • memory/1328-79-0x0000000000000000-mapping.dmp

      • memory/1776-73-0x0000000000000000-mapping.dmp

      • memory/1776-83-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/1776-95-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/1816-100-0x0000000000000000-mapping.dmp

      • memory/1816-106-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/1876-93-0x00000000004020A5-mapping.dmp

      • memory/2040-81-0x0000000002E80000-0x0000000002E9A000-memory.dmp

        Filesize

        104KB

      • memory/2040-78-0x0000000002E80000-0x0000000002E9A000-memory.dmp

        Filesize

        104KB

      • memory/2040-70-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2040-67-0x00000000004020A5-mapping.dmp

      • memory/2040-63-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2040-65-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2040-60-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2040-58-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2040-56-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2040-55-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2040-107-0x0000000002E80000-0x0000000002E9A000-memory.dmp

        Filesize

        104KB