Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/12/2022, 14:14

General

  • Target

    ad010e36e47b8c3052f3e5afff646b8060c8081a0a330638d82f53dc003649a2.exe

  • Size

    230KB

  • MD5

    557e9a3db30c584a613d8fe9cd79e3c4

  • SHA1

    1146db60ef66cfd8d5fd80ec436f41459d4fe4ff

  • SHA256

    ad010e36e47b8c3052f3e5afff646b8060c8081a0a330638d82f53dc003649a2

  • SHA512

    b07f6ddb86e84e2809d08576243de5181d1f70bf782d3bc1963143a6729a77d9554bb44177ae0cfffc12a5cda77a90ea8bfbb220c7de3537b80f14e3a6465ab2

  • SSDEEP

    3072:CRt/QLSLy575epD5sqUnxa4yezh1EbC24Kjaq+DjLpt5nLmM+V+Y700:vLum5ADCLzh64n7nH5LmM+Vl7l

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 24 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad010e36e47b8c3052f3e5afff646b8060c8081a0a330638d82f53dc003649a2.exe
    "C:\Users\Admin\AppData\Local\Temp\ad010e36e47b8c3052f3e5afff646b8060c8081a0a330638d82f53dc003649a2.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2748
  • C:\Users\Admin\AppData\Local\Temp\7B4A.exe
    C:\Users\Admin\AppData\Local\Temp\7B4A.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qfyshwqueqdpai.tmp",Dioeeedresq
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14002
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4300
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4912

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\7B4A.exe

            Filesize

            1021KB

            MD5

            f84dfaaada137574779b8e0ad0ca9cf7

            SHA1

            1927843ba73e0fed63cfe786fb20929df9985432

            SHA256

            a92e7a49fc22dc620c75134e35b425cf2ad576054a950e3c9c2a186afba5b1d3

            SHA512

            7dfc977e452466f909660ccfc00fbc82de471afa072ecb5d92902142b296862c7d5dd90a2c852d11806a519119c0e4225f633c5b3e2c0ec644f3bf49377273ce

          • C:\Users\Admin\AppData\Local\Temp\7B4A.exe

            Filesize

            1021KB

            MD5

            f84dfaaada137574779b8e0ad0ca9cf7

            SHA1

            1927843ba73e0fed63cfe786fb20929df9985432

            SHA256

            a92e7a49fc22dc620c75134e35b425cf2ad576054a950e3c9c2a186afba5b1d3

            SHA512

            7dfc977e452466f909660ccfc00fbc82de471afa072ecb5d92902142b296862c7d5dd90a2c852d11806a519119c0e4225f633c5b3e2c0ec644f3bf49377273ce

          • C:\Users\Admin\AppData\Local\Temp\Qfyshwqueqdpai.tmp

            Filesize

            792KB

            MD5

            822d3ead416a1a85cb96e65f65cd5ae2

            SHA1

            af32b69e2835d1cacdadb97ae6dfafccc32d1837

            SHA256

            72bdb3a06dca8458ac9aedf06785b2d7b95a19f8b9f3f8f5be2eb4744e9c5d1d

            SHA512

            48d0d61efd51fd2d8eb04d990b4a5b3ca34c916199d3b0a3b135d2089e028ee37f5145e4705fb75da77eaabbe12f8c4ea55775a41e1b1c68a90ce68b8c2a7260

          • \Users\Admin\AppData\Local\Temp\Qfyshwqueqdpai.tmp

            Filesize

            792KB

            MD5

            822d3ead416a1a85cb96e65f65cd5ae2

            SHA1

            af32b69e2835d1cacdadb97ae6dfafccc32d1837

            SHA256

            72bdb3a06dca8458ac9aedf06785b2d7b95a19f8b9f3f8f5be2eb4744e9c5d1d

            SHA512

            48d0d61efd51fd2d8eb04d990b4a5b3ca34c916199d3b0a3b135d2089e028ee37f5145e4705fb75da77eaabbe12f8c4ea55775a41e1b1c68a90ce68b8c2a7260

          • memory/2072-181-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-178-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-164-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-165-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-158-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-205-0x0000000000400000-0x0000000000524000-memory.dmp

            Filesize

            1.1MB

          • memory/2072-157-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-190-0x0000000002180000-0x000000000225F000-memory.dmp

            Filesize

            892KB

          • memory/2072-194-0x0000000000400000-0x0000000000524000-memory.dmp

            Filesize

            1.1MB

          • memory/2072-192-0x00000000022E0000-0x00000000023F1000-memory.dmp

            Filesize

            1.1MB

          • memory/2072-188-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-187-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-186-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-185-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-184-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-183-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-159-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-182-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-180-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-160-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-177-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-176-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-175-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-174-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-161-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-172-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-173-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-171-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-170-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-169-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-168-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-167-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-166-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-162-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2072-156-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2244-295-0x0000000008440000-0x0000000008F9D000-memory.dmp

            Filesize

            11.4MB

          • memory/2244-309-0x0000000006979000-0x000000000697B000-memory.dmp

            Filesize

            8KB

          • memory/2244-312-0x0000000008440000-0x0000000008F9D000-memory.dmp

            Filesize

            11.4MB

          • memory/2748-141-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-116-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-119-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-136-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-120-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-153-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/2748-152-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-151-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-150-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-149-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/2748-148-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-146-0x0000000000460000-0x000000000050E000-memory.dmp

            Filesize

            696KB

          • memory/2748-147-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-144-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-143-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-142-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-121-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-140-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-139-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-145-0x0000000000460000-0x000000000050E000-memory.dmp

            Filesize

            696KB

          • memory/2748-137-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-135-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-134-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-133-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-132-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-131-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-130-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-129-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-128-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-127-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-126-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-125-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-118-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-117-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-124-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-122-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/2748-123-0x0000000076FB0000-0x000000007713E000-memory.dmp

            Filesize

            1.6MB

          • memory/4300-310-0x00000000008A0000-0x0000000000B3C000-memory.dmp

            Filesize

            2.6MB

          • memory/4300-311-0x00000221BBCF0000-0x00000221BBF9E000-memory.dmp

            Filesize

            2.7MB