Analysis

  • max time kernel
    57s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07/12/2022, 01:52

General

  • Target

    b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6.exe

  • Size

    317KB

  • MD5

    108fba088fdc348c8d72ea5a7cea77e0

  • SHA1

    3af8475127846dbd4d1d53c723d3cc3991a7f292

  • SHA256

    b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6

  • SHA512

    5174cbad769a4f320ed138c622b71a359edaf3dfc1c69ebad51619e2fba8a981c47d88700c0a0cf2231a9072bd76c9f021a37602f372ea64ecbb18cf8e6b93f7

  • SSDEEP

    3072:kOXpHv1O0koutuVxz+8YPmK8d4aSnww00ptcfMPBm7pcC787LgJsnVZ7YK7fk7oa:JpmoSujMPgd4aSnF00LcUCMgJsnPtPC

Score
8/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6.exe
    "C:\Users\Admin\AppData\Local\Temp\b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\F3A3.tmp\loadzinho.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "Zurik System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\antimalware.exe" /f
        3⤵
        • Adds Run key to start application
        PID:572
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "Acrobat Reader" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\antihosts.exe" /f
        3⤵
        • Adds Run key to start application
        PID:764
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\antihosts.exe""
        3⤵
          PID:1440
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\antimalware.exe""
          3⤵
            PID:1924

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\F3A3.tmp\loadzinho.bat

        Filesize

        1KB

        MD5

        f01c29416ebdf052d17bcec0b3320dcf

        SHA1

        1b1e802de2828a5f56661904b174d073f76939a1

        SHA256

        94909b9fa5fd275de8d14187a39800a5e5fc60e9b46f5f95501b34cc42bede32

        SHA512

        69f7ff74a3677130dfa01b11f77c043b2bba345e532881bc47b7fd2f1fb3ac84a897464142b8f6cfb4c1eb02dadb7808ec2433af7107ca872e14bd12cc533ceb

      • memory/1140-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

        Filesize

        8KB

      • memory/1140-55-0x0000000000400000-0x00000000004A4000-memory.dmp

        Filesize

        656KB

      • memory/1140-62-0x0000000000400000-0x00000000004A4000-memory.dmp

        Filesize

        656KB