Analysis

  • max time kernel
    90s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2022 19:04

General

  • Target

    74a809635088d33cd62849f498fea46f9b47cf26ccbc90758802c3e0fae72230.exe

  • Size

    1.7MB

  • MD5

    620e9df00171e10ac9d5a407b1506e34

  • SHA1

    bb184a1c46540c83acae26e50f72b75af4ae46e8

  • SHA256

    74a809635088d33cd62849f498fea46f9b47cf26ccbc90758802c3e0fae72230

  • SHA512

    c12d2c3fef1ba8fb264e699955da71581c2c61ba7cae52537bf8a3f2e81f67be4c359b730c2a7c0f17c2b8a795ca5f9725f1aeb26a29688fbddbb303fab9de85

  • SSDEEP

    49152:1Gp6+G0y8re5kaKVX7r6d7OGOMGERZA006mblvHf:Apdrbn6pAV6O3

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74a809635088d33cd62849f498fea46f9b47cf26ccbc90758802c3e0fae72230.exe
    "C:\Users\Admin\AppData\Local\Temp\74a809635088d33cd62849f498fea46f9b47cf26ccbc90758802c3e0fae72230.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Users\Admin\AppData\Local\Temp\is-G4I4K.tmp\is-49F3R.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-G4I4K.tmp\is-49F3R.tmp" /SL4 $D005E "C:\Users\Admin\AppData\Local\Temp\74a809635088d33cd62849f498fea46f9b47cf26ccbc90758802c3e0fae72230.exe" 1527261 50688
      2⤵
      • Executes dropped EXE
      PID:3012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-G4I4K.tmp\is-49F3R.tmp

    Filesize

    641KB

    MD5

    fa8621bfc44318a0e45e5a3414345318

    SHA1

    29de99e82aa87911d0761c95632ffec405164d93

    SHA256

    6297413b839879d5ca391c1b8a3568bb07bee509748bcc6aa5b9906eaab8ae84

    SHA512

    797d3a9167b200f5eb8c2077d0e72d3359e602c8a665d6f0bec95387e7a8ffa5e7d4f3a0a827eb0cfb6f17392a8856624c01d9f5231d67d619dcc982c5ede1dc

  • C:\Users\Admin\AppData\Local\Temp\is-G4I4K.tmp\is-49F3R.tmp

    Filesize

    641KB

    MD5

    fa8621bfc44318a0e45e5a3414345318

    SHA1

    29de99e82aa87911d0761c95632ffec405164d93

    SHA256

    6297413b839879d5ca391c1b8a3568bb07bee509748bcc6aa5b9906eaab8ae84

    SHA512

    797d3a9167b200f5eb8c2077d0e72d3359e602c8a665d6f0bec95387e7a8ffa5e7d4f3a0a827eb0cfb6f17392a8856624c01d9f5231d67d619dcc982c5ede1dc

  • memory/1480-132-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1480-137-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB