Analysis

  • max time kernel
    243s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 20:00

General

  • Target

    dd0ae85b6880e6ca969e9914a6e87924422caee1c5d120476a391e792fcfb2e3.exe

  • Size

    289KB

  • MD5

    eb489e782d148f5c3b26719aea100cfd

  • SHA1

    fecb87fb718c7afd95338a32e8b8c1054ae318d1

  • SHA256

    dd0ae85b6880e6ca969e9914a6e87924422caee1c5d120476a391e792fcfb2e3

  • SHA512

    625f548699f7ad689a8f3906c45072d7a16794d82104073852864c8888a741903668b430d922f57f66d0554a6dc60407921d1b44487c4e3190f39b1a17a78527

  • SSDEEP

    6144:xbsRhlHPETniv6iatoAKCYeX4XSSARzRKAWtmcxc+dWLxiqUo+4X:xbsRhlHPETniv6iatoAKCYA4XSSARFKw

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd0ae85b6880e6ca969e9914a6e87924422caee1c5d120476a391e792fcfb2e3.exe
    "C:\Users\Admin\AppData\Local\Temp\dd0ae85b6880e6ca969e9914a6e87924422caee1c5d120476a391e792fcfb2e3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Users\Admin\AppData\Local\Temp\dd0ae85b6880e6ca969e9914a6e87924422caee1c5d120476a391e792fcfb2e3.exe
      "C:\Users\Admin\AppData\Local\Temp\dd0ae85b6880e6ca969e9914a6e87924422caee1c5d120476a391e792fcfb2e3.exe"
      2⤵
      • Adds policy Run key to start application
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\dd0ae85b6880e6ca969e9914a6e87924422caee1c5d120476a391e792fcfb2e3.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/584-56-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/584-57-0x000000000040769C-mapping.dmp

  • memory/584-58-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/584-59-0x0000000075C11000-0x0000000075C13000-memory.dmp

    Filesize

    8KB

  • memory/584-60-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/584-61-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/584-63-0x0000000010410000-0x000000001046C000-memory.dmp

    Filesize

    368KB

  • memory/584-69-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB