Analysis

  • max time kernel
    147s
  • max time network
    213s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2022, 15:48

General

  • Target

    kaspersky-21.2.16.590.exe

  • Size

    2.8MB

  • MD5

    051a4c0c1f78a4acfd61af4a00c04d9a

  • SHA1

    a7d5522903f48c89f24f8893c480b8eb0360198e

  • SHA256

    71a83ef659aa734ae2dfcf7e106f3003e03fd29931e50ce9cf7f926cabd5ff06

  • SHA512

    1b4f8dd6f7f48ec130587782936a10e016cb69234fef30b2b19ee2eb1948f7b1ff15a0085746d122018db65d89748681c2df51da011cb145093cbdb473e389d7

  • SSDEEP

    49152:alINc3mvkxv9HnIyB8cKGdUDUe2QK0m0zJgHvQtuEG2EeyByoyjf02yt8o15D0:8INc3vbHnIyB8dGdU4e9Vzxtu/2ndogI

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks for any installed AV software in registry 1 TTPs 46 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\kaspersky-21.2.16.590.exe
    "C:\Users\Admin\AppData\Local\Temp\kaspersky-21.2.16.590.exe"
    1⤵
    • Loads dropped DLL
    • Checks for any installed AV software in registry
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Users\Admin\AppData\Local\Temp\C43E2FF0-8798-11ED-8FA4-466E2F293893\TEST_WPF.EXE
      "C:\Users\Admin\AppData\Local\Temp\C43E2FF0-8798-11ED-8FA4-466E2F293893\TEST_WPF.EXE" "C:\Users\Admin\AppData\Local\Temp\09DC786A8978DE11F84A64E6F2928339\setup.dll"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1656
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x57c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\09DC786A8978DE11F84A64E6F2928339\setup.dll

    Filesize

    5.4MB

    MD5

    2f671ef0834015fb62e164c245975572

    SHA1

    92cee28181b78ec13dc7265a1ec21b92932e7d78

    SHA256

    6751cc59a8645fe24d01586d2930fd6abcaa5ec94393cccdaf096f05cb784ea8

    SHA512

    4b7982c806d68c2ed9019ce5694a1a7e0d7300ff36537b716e7b7a5e1521333359d3944a3b1c8c4d479aed112ddb8515ab5a6efb4d6a7082907d653ec08022e2

  • C:\Users\Admin\AppData\Local\Temp\C43E2FF0-8798-11ED-8FA4-466E2F293893\TEST_WPF.EXE

    Filesize

    25KB

    MD5

    ae4e9414ab1c809d6ed98e8e60a0f2f9

    SHA1

    d82aeac85306ed3045803d05eaec0f800fc1fbd4

    SHA256

    ae5346661f9f0fd6dd550af1ff60e214f61326cb5ce0baddef1bbe58e0d48e42

    SHA512

    7fdb0bab8fe1b8395037aa9eee7b12a6e3f521fcf8f110a568051a283044d6846e2d9577800e2693336f47b5506a25207a955b52aed2e26336f06e10d6c3de5a

  • C:\Users\Admin\AppData\Local\Temp\C43E2FF0-8798-11ED-8FA4-466E2F293893\TEST_WPF.EXE

    Filesize

    25KB

    MD5

    ae4e9414ab1c809d6ed98e8e60a0f2f9

    SHA1

    d82aeac85306ed3045803d05eaec0f800fc1fbd4

    SHA256

    ae5346661f9f0fd6dd550af1ff60e214f61326cb5ce0baddef1bbe58e0d48e42

    SHA512

    7fdb0bab8fe1b8395037aa9eee7b12a6e3f521fcf8f110a568051a283044d6846e2d9577800e2693336f47b5506a25207a955b52aed2e26336f06e10d6c3de5a

  • C:\Users\Admin\AppData\Local\Temp\C43E2FF0-8798-11ED-8FA4-466E2F293893\TEST_WPF.EXE.config

    Filesize

    215B

    MD5

    291d5cf5b0752c78eaefa2c1d099cdd6

    SHA1

    39d2c6a4ac22c219de3bf7e44733e4d02e4a08d8

    SHA256

    8a09e9d24204a2e4dcbb2ace67e06e7a04934fa7b1741579aa2ccddc3eeb7a8d

    SHA512

    0b10053abfdbc49a35191ad7e8e73bee0550ef50fb1cd5fe368e3e21260e948d91521e74e6a7ad31547aa4ab3d157ce8a17ad60632e0e27c82436bcb0da15c34

  • \Users\Admin\AppData\Local\Temp\09DC786A8978DE11F84A64E6F2928339\setup.dll

    Filesize

    5.4MB

    MD5

    2f671ef0834015fb62e164c245975572

    SHA1

    92cee28181b78ec13dc7265a1ec21b92932e7d78

    SHA256

    6751cc59a8645fe24d01586d2930fd6abcaa5ec94393cccdaf096f05cb784ea8

    SHA512

    4b7982c806d68c2ed9019ce5694a1a7e0d7300ff36537b716e7b7a5e1521333359d3944a3b1c8c4d479aed112ddb8515ab5a6efb4d6a7082907d653ec08022e2

  • \Users\Admin\AppData\Local\Temp\09DC786A8978DE11F84A64E6F2928339\setup.dll

    Filesize

    5.4MB

    MD5

    2f671ef0834015fb62e164c245975572

    SHA1

    92cee28181b78ec13dc7265a1ec21b92932e7d78

    SHA256

    6751cc59a8645fe24d01586d2930fd6abcaa5ec94393cccdaf096f05cb784ea8

    SHA512

    4b7982c806d68c2ed9019ce5694a1a7e0d7300ff36537b716e7b7a5e1521333359d3944a3b1c8c4d479aed112ddb8515ab5a6efb4d6a7082907d653ec08022e2

  • \Users\Admin\AppData\Local\Temp\C43E2FF0-8798-11ED-8FA4-466E2F293893\TEST_WPF.EXE

    Filesize

    25KB

    MD5

    ae4e9414ab1c809d6ed98e8e60a0f2f9

    SHA1

    d82aeac85306ed3045803d05eaec0f800fc1fbd4

    SHA256

    ae5346661f9f0fd6dd550af1ff60e214f61326cb5ce0baddef1bbe58e0d48e42

    SHA512

    7fdb0bab8fe1b8395037aa9eee7b12a6e3f521fcf8f110a568051a283044d6846e2d9577800e2693336f47b5506a25207a955b52aed2e26336f06e10d6c3de5a

  • \Users\Admin\AppData\Local\Temp\CA353200-8798-11ED-8FA4-466E2F293893\Cleaner\cleanapi.dll

    Filesize

    5.2MB

    MD5

    8ffe3a1d89cf4dcb0284ed5c78c98a9a

    SHA1

    683308ae8e3e1786bea08d2019bccb800b9d0942

    SHA256

    fba0d077cf54eb3d17dbdb3eca754a116492bc004ee6c445abf6c24c244c26fa

    SHA512

    8b258e4b1922db509348319b3c51ec042b6e761acc32d5bf17d3a5a57ab4bf28e452fe6391712f2b83387d8f8ce66610dd81aa570b9f87aab7bd89cda861ca1e

  • memory/1656-122-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-117-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-73-0x0000000004510000-0x0000000004A72000-memory.dmp

    Filesize

    5.4MB

  • memory/1656-78-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-80-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-79-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-82-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-81-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-83-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-84-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-85-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-86-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-87-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-92-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-94-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-95-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-120-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-91-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-96-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-101-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-105-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-115-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-124-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-125-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-118-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-136-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-135-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-134-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-132-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-133-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-130-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-129-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-128-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-127-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-126-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-123-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-121-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-93-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-75-0x0000000000310000-0x0000000000318000-memory.dmp

    Filesize

    32KB

  • memory/1656-131-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-119-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-116-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-114-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-113-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-112-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-111-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-110-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-109-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-108-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-107-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-106-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-104-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-103-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-102-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-100-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-99-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-98-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-97-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-90-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-89-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-88-0x0000000077FA0000-0x0000000077FB0000-memory.dmp

    Filesize

    64KB

  • memory/1656-185-0x0000000004D60000-0x00000000050D7000-memory.dmp

    Filesize

    3.5MB

  • memory/1656-186-0x00000000050E0000-0x000000000521C000-memory.dmp

    Filesize

    1.2MB

  • memory/1656-187-0x0000000005220000-0x0000000005814000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-188-0x0000000005820000-0x0000000005B84000-memory.dmp

    Filesize

    3.4MB

  • memory/1656-189-0x0000000005BE0000-0x0000000005C7C000-memory.dmp

    Filesize

    624KB

  • memory/1656-190-0x0000000006060000-0x00000000060C4000-memory.dmp

    Filesize

    400KB

  • memory/1656-191-0x00000000060D0000-0x000000000635C000-memory.dmp

    Filesize

    2.5MB

  • memory/1656-193-0x0000000006420000-0x0000000006458000-memory.dmp

    Filesize

    224KB

  • memory/1656-194-0x0000000006630000-0x0000000006670000-memory.dmp

    Filesize

    256KB

  • memory/1656-195-0x0000000006A00000-0x0000000006A08000-memory.dmp

    Filesize

    32KB

  • memory/1656-196-0x0000000006B90000-0x0000000006B9E000-memory.dmp

    Filesize

    56KB

  • memory/1656-197-0x0000000005CD5000-0x0000000005CE6000-memory.dmp

    Filesize

    68KB

  • memory/1656-198-0x0000000006480000-0x000000000648A000-memory.dmp

    Filesize

    40KB

  • memory/1904-54-0x0000000077F90000-0x0000000077FA0000-memory.dmp

    Filesize

    64KB

  • memory/1904-55-0x0000000077F90000-0x0000000077FA0000-memory.dmp

    Filesize

    64KB

  • memory/1904-56-0x0000000077F90000-0x0000000077FA0000-memory.dmp

    Filesize

    64KB

  • memory/1904-58-0x0000000076DC1000-0x0000000076DC3000-memory.dmp

    Filesize

    8KB

  • memory/1904-59-0x0000000071C81000-0x0000000071C83000-memory.dmp

    Filesize

    8KB