Analysis

  • max time kernel
    251s
  • max time network
    337s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 14:22

General

  • Target

    33cfde0badba18cca2d44476d7d45edc.exe

  • Size

    328KB

  • MD5

    33cfde0badba18cca2d44476d7d45edc

  • SHA1

    290003e3266acffa2e669e50ff0aad8f3974b214

  • SHA256

    3650e941f589db93a518d602e4b0ddd9a54c7c42f3d1d06bdda467651cbb95f7

  • SHA512

    9ee920f4b040d54b48bd80bf1cf29a9ce8572fbf75c737f55fdf8fc7127b63d900e3690af85124b40593e1a30142bce7235c8df025c7e1ec71f97e8cf4478dc5

  • SSDEEP

    6144:PBnxm/hZudIIuLpZPP5ZW757lLRmNAIOVn:LzdIZpZPcVmNPG

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33cfde0badba18cca2d44476d7d45edc.exe
    "C:\Users\Admin\AppData\Local\Temp\33cfde0badba18cca2d44476d7d45edc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe
      "C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe" C:\Users\Admin\AppData\Local\Temp\rrchmtd.ihc
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:760
      • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe
        "C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:868
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 184
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:640

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\kmxqftqk.qph
    Filesize

    98KB

    MD5

    6c84aab264b84f7b49e3469dadc6fd2e

    SHA1

    b504d78a83fc55921d8696019d1ba3117358e71d

    SHA256

    814b2671e7062d4a1a0de38d9c5bf5dc0195af248397b39e65300993066d99f9

    SHA512

    c7f0a6145160e1692f24fea49340b884636393138114765bdd93f469fb30c131e004527b0205c8549da4c77d16b556900c58e182485ba65b1dcffa2a49948b3a

  • C:\Users\Admin\AppData\Local\Temp\rrchmtd.ihc
    Filesize

    7KB

    MD5

    88c3926cb29745d988b0e794378e4728

    SHA1

    8b58f03f1542aa30878619e52a800037538639cb

    SHA256

    5ef5687c9cfc258ff4283ce3b67eef061bfedb2e7b81f76392a3ffdcc5a061ca

    SHA512

    b3cd557f2ba7325f07ba2004365959d02dbb4b63607b807e652c409876effbe9e4e393d44cf9d9d827ceec21f24f93a72e3fb3926fb07269f751a2a162480fef

  • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe
    Filesize

    13KB

    MD5

    a76eebf673691ad96288a99825e4c5c6

    SHA1

    e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

    SHA256

    266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

    SHA512

    34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

  • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe
    Filesize

    13KB

    MD5

    a76eebf673691ad96288a99825e4c5c6

    SHA1

    e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

    SHA256

    266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

    SHA512

    34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

  • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe
    Filesize

    13KB

    MD5

    a76eebf673691ad96288a99825e4c5c6

    SHA1

    e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

    SHA256

    266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

    SHA512

    34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

  • \Users\Admin\AppData\Local\Temp\xcfoyif.exe
    Filesize

    13KB

    MD5

    a76eebf673691ad96288a99825e4c5c6

    SHA1

    e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

    SHA256

    266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

    SHA512

    34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

  • \Users\Admin\AppData\Local\Temp\xcfoyif.exe
    Filesize

    13KB

    MD5

    a76eebf673691ad96288a99825e4c5c6

    SHA1

    e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

    SHA256

    266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

    SHA512

    34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

  • \Users\Admin\AppData\Local\Temp\xcfoyif.exe
    Filesize

    13KB

    MD5

    a76eebf673691ad96288a99825e4c5c6

    SHA1

    e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

    SHA256

    266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

    SHA512

    34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

  • \Users\Admin\AppData\Local\Temp\xcfoyif.exe
    Filesize

    13KB

    MD5

    a76eebf673691ad96288a99825e4c5c6

    SHA1

    e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

    SHA256

    266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

    SHA512

    34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

  • \Users\Admin\AppData\Local\Temp\xcfoyif.exe
    Filesize

    13KB

    MD5

    a76eebf673691ad96288a99825e4c5c6

    SHA1

    e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

    SHA256

    266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

    SHA512

    34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

  • memory/560-54-0x0000000075551000-0x0000000075553000-memory.dmp
    Filesize

    8KB

  • memory/640-66-0x0000000000000000-mapping.dmp
  • memory/760-56-0x0000000000000000-mapping.dmp
  • memory/868-63-0x0000000000085738-mapping.dmp