Analysis

  • max time kernel
    153s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2022 15:56

General

  • Target

    CNGB_Installer.exe

  • Size

    36.3MB

  • MD5

    9bbbcd32d4d99546d94e6f026501e32a

  • SHA1

    986e306fc79ab6a650cdd516c5e7d97adbbe522a

  • SHA256

    17039d8920c1a6f2302272b784383c4737df7e30adc2b6f42d8cde1be21eba66

  • SHA512

    509e9fc35802415162c123779587d0416f2af4a0911656c21936bad473870df5a29747dcb60e227e2decb29aa38e086e7e7cff19d3237cba89f3dde165c47a18

  • SSDEEP

    786432:YPjHMaI+OxsPtQL1sNyC/dz0Pkf4S87mEFn/GcZkIXK/:Yrl22tAW4qZQ+Utn/GcZJK/

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CNGB_Installer.exe
    "C:\Users\Admin\AppData\Local\Temp\CNGB_Installer.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1508
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 76AD1C31246E49633815BB8985AD9FC2 C
      2⤵
      • Loads dropped DLL
      PID:1572

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI88C0.tmp

    Filesize

    259KB

    MD5

    f4856ffe500e45f2ee07ccebb06f9958

    SHA1

    905bfb953d755d965a900a0d4ba05619bfe0ef3f

    SHA256

    7238299a109a796d086d9cf611ffef1e4ae768898b1006022f464890544482b8

    SHA512

    31d02f0b041495853ab98c93808b6efc7a866ce282334d60edd60c4167b6f1b87d06b50a73c3784417a5878be290616fe8587eca5d7f6b5699c3a0aa91170820

  • \Users\Admin\AppData\Local\Temp\MSI88C0.tmp

    Filesize

    259KB

    MD5

    f4856ffe500e45f2ee07ccebb06f9958

    SHA1

    905bfb953d755d965a900a0d4ba05619bfe0ef3f

    SHA256

    7238299a109a796d086d9cf611ffef1e4ae768898b1006022f464890544482b8

    SHA512

    31d02f0b041495853ab98c93808b6efc7a866ce282334d60edd60c4167b6f1b87d06b50a73c3784417a5878be290616fe8587eca5d7f6b5699c3a0aa91170820

  • memory/1508-54-0x0000000075451000-0x0000000075453000-memory.dmp

    Filesize

    8KB

  • memory/1508-55-0x0000000073D01000-0x0000000073D03000-memory.dmp

    Filesize

    8KB

  • memory/1780-56-0x000007FEFBAB1000-0x000007FEFBAB3000-memory.dmp

    Filesize

    8KB