Analysis

  • max time kernel
    31s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 14:22

General

  • Target

    773fb681c3115952129dfab8a192b111.exe

  • Size

    347KB

  • MD5

    773fb681c3115952129dfab8a192b111

  • SHA1

    6cad9d1d3f6d3607bc8dcd388c972056c6184dc7

  • SHA256

    613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c

  • SHA512

    ffcaacf102264a20fed98bee11b15ade13c98062e42f70fc52d73897adb278b6c2f96e3cfce0993d9f94d31bc1914f7ac3c017d30de704f3a002f84b2fb3f3e0

  • SSDEEP

    6144:HBnAU1X9Tel6FV4aUR4VC+S7VK85ibLbSu+:WU1+6FV494iJKJfSu+

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\773fb681c3115952129dfab8a192b111.exe
    "C:\Users\Admin\AppData\Local\Temp\773fb681c3115952129dfab8a192b111.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Users\Admin\AppData\Local\Temp\dibdtf.exe
      "C:\Users\Admin\AppData\Local\Temp\dibdtf.exe" C:\Users\Admin\AppData\Local\Temp\dvvabwhzxx.i
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Users\Admin\AppData\Local\Temp\dibdtf.exe
        "C:\Users\Admin\AppData\Local\Temp\dibdtf.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 184
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dibdtf.exe

    Filesize

    12KB

    MD5

    36063c9383803d4b38d2aa4f8ea183d5

    SHA1

    8e7b673b92a8f000ad9ac42241d28e7fb0c91c90

    SHA256

    09989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46

    SHA512

    06d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50

  • C:\Users\Admin\AppData\Local\Temp\dibdtf.exe

    Filesize

    12KB

    MD5

    36063c9383803d4b38d2aa4f8ea183d5

    SHA1

    8e7b673b92a8f000ad9ac42241d28e7fb0c91c90

    SHA256

    09989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46

    SHA512

    06d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50

  • C:\Users\Admin\AppData\Local\Temp\dibdtf.exe

    Filesize

    12KB

    MD5

    36063c9383803d4b38d2aa4f8ea183d5

    SHA1

    8e7b673b92a8f000ad9ac42241d28e7fb0c91c90

    SHA256

    09989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46

    SHA512

    06d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50

  • C:\Users\Admin\AppData\Local\Temp\dvvabwhzxx.i

    Filesize

    7KB

    MD5

    35624c6acd0194e2e770e3395b572d3a

    SHA1

    4254b904007d09fe30b818cc5598eade268cf733

    SHA256

    55049d092cd835e31d70707dbf7098835bd9ad0c388352e6ca9f7604cd570974

    SHA512

    342f3ce332bf0bf635fc6c0087dd2915aad95a22afd005ae12e79e9d069552e1920180e70b9842e15b53cf77d50280b3e0162d6aa1103a253560aeae17a5a47a

  • C:\Users\Admin\AppData\Local\Temp\obldfly.u

    Filesize

    98KB

    MD5

    5dfce1ea3fcdb244cb1fbc3c16f15fe2

    SHA1

    91a9a5001b6f44937b861c7c4739290d9d4e7016

    SHA256

    f2ed263a2dc26bcb9fc7c192aa31ef33af78491a2d57384bb5efb06bdff50acc

    SHA512

    421c7ed3909b95f708e1e5b70bba65f1a0f0a7c4ddaa48e68a3c649dd6f59622b8ec7b4d9ecfabf9aa879582d2c624e779622f57fec852a5a5f26c5c32e9a6b2

  • \Users\Admin\AppData\Local\Temp\dibdtf.exe

    Filesize

    12KB

    MD5

    36063c9383803d4b38d2aa4f8ea183d5

    SHA1

    8e7b673b92a8f000ad9ac42241d28e7fb0c91c90

    SHA256

    09989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46

    SHA512

    06d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50

  • \Users\Admin\AppData\Local\Temp\dibdtf.exe

    Filesize

    12KB

    MD5

    36063c9383803d4b38d2aa4f8ea183d5

    SHA1

    8e7b673b92a8f000ad9ac42241d28e7fb0c91c90

    SHA256

    09989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46

    SHA512

    06d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50

  • \Users\Admin\AppData\Local\Temp\dibdtf.exe

    Filesize

    12KB

    MD5

    36063c9383803d4b38d2aa4f8ea183d5

    SHA1

    8e7b673b92a8f000ad9ac42241d28e7fb0c91c90

    SHA256

    09989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46

    SHA512

    06d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50

  • \Users\Admin\AppData\Local\Temp\dibdtf.exe

    Filesize

    12KB

    MD5

    36063c9383803d4b38d2aa4f8ea183d5

    SHA1

    8e7b673b92a8f000ad9ac42241d28e7fb0c91c90

    SHA256

    09989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46

    SHA512

    06d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50

  • \Users\Admin\AppData\Local\Temp\dibdtf.exe

    Filesize

    12KB

    MD5

    36063c9383803d4b38d2aa4f8ea183d5

    SHA1

    8e7b673b92a8f000ad9ac42241d28e7fb0c91c90

    SHA256

    09989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46

    SHA512

    06d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50

  • memory/1592-54-0x0000000074FB1000-0x0000000074FB3000-memory.dmp

    Filesize

    8KB