Analysis

  • max time kernel
    143s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2022 00:14

General

  • Target

    e60801c6474a4a8488a4cd2c7ec9171af4bf2d6af3f1867e5541c6af7e679c16.exe

  • Size

    387KB

  • MD5

    e752030b1459d1111586cc0d9c9b333e

  • SHA1

    bf64c88086e361609ca998f04439a7e22c2387af

  • SHA256

    e60801c6474a4a8488a4cd2c7ec9171af4bf2d6af3f1867e5541c6af7e679c16

  • SHA512

    a706e987a7dccd0a81e1af617040ab1b3130ea1c44b25d566fe7614a5cad15f76ac1a9bcd7dab14fc0f4ff26faa67b15c50231bbc2c97bda0177b03756f033c1

  • SSDEEP

    6144:GOmhQOYgv7KaBeZxWf8/6bqY4f+UeZxDND2m+olO4TFRJL+d0uXxadqXWO0xm:GOp+D0FLY4fpeLRSm5Q4JR4dZBadqb6

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 55 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e60801c6474a4a8488a4cd2c7ec9171af4bf2d6af3f1867e5541c6af7e679c16.exe
    "C:\Users\Admin\AppData\Local\Temp\e60801c6474a4a8488a4cd2c7ec9171af4bf2d6af3f1867e5541c6af7e679c16.exe"
    1⤵
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s C:\Windows\system32\sysdivx.dll
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\sysdivx.dll

    Filesize

    213KB

    MD5

    138fc3fdcdc99600c0c9e90607416123

    SHA1

    19ae6f535c86906009ca22d2a0ca12bb5b7f2974

    SHA256

    d788dafce27035f4e5b8ca912d9590af7f9031d545e41502c91df669120003a4

    SHA512

    efabe3301ff2db8d816117df76c5d413e72703963d0d0682590f3d03b41688f07c8f884540d15841bf6a142461b9bedaa299f3071362dac56b6446734fd83d4c

  • \Windows\SysWOW64\sysdivx.dll

    Filesize

    213KB

    MD5

    138fc3fdcdc99600c0c9e90607416123

    SHA1

    19ae6f535c86906009ca22d2a0ca12bb5b7f2974

    SHA256

    d788dafce27035f4e5b8ca912d9590af7f9031d545e41502c91df669120003a4

    SHA512

    efabe3301ff2db8d816117df76c5d413e72703963d0d0682590f3d03b41688f07c8f884540d15841bf6a142461b9bedaa299f3071362dac56b6446734fd83d4c

  • memory/576-56-0x0000000000000000-mapping.dmp

  • memory/1236-54-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

    Filesize

    8KB

  • memory/1236-55-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1236-60-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB