Resubmissions

10-01-2023 00:57

230110-ba58dsgd29 8

09-01-2023 22:17

230109-17r5gaga66 10

Analysis

  • max time kernel
    1632s
  • max time network
    1802s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2023 00:57

General

  • Target

    6af2204e4e62a5d44462335379f8e70f7d680da84f2a7f6c328fbd40014694ef.exe

  • Size

    1.0MB

  • MD5

    067b0d35578c2755a06e9e6b702c4c05

  • SHA1

    603edd059b6a616a984ba4582cd86384234ba2d0

  • SHA256

    6af2204e4e62a5d44462335379f8e70f7d680da84f2a7f6c328fbd40014694ef

  • SHA512

    992617a6220a41fde70e3e457b27a1b7474af44d23d501474c8e466e4648ea1a281b277f667434f097dc1808d3299a7b18076e16a924e15aa29319a8f0ff0595

  • SSDEEP

    12288:u9iJB1C4k6XXEdR16EjdL7in0DpEXhZV8F9jL2FvEd/0rhFyYcvFb+BCFhyP8+:uoJuFfHjpsZVAv/0ruYctb+YFQ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6af2204e4e62a5d44462335379f8e70f7d680da84f2a7f6c328fbd40014694ef.exe
    "C:\Users\Admin\AppData\Local\Temp\6af2204e4e62a5d44462335379f8e70f7d680da84f2a7f6c328fbd40014694ef.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Users\Admin\Baskov\kernel32.exe
      "C:\Users\Admin\Baskov\kernel32.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1784
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
          PID:560
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:580
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\6af2204e4e62a5d44462335379f8e70f7d680da84f2a7f6c328fbd40014694ef.exe"
        2⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1396
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          3⤵
            PID:828
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1
            3⤵
            • Runs ping.exe
            PID:1324

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Baskov\kernel32.exe

        Filesize

        651.0MB

        MD5

        46f42ebca6a23b350e110f1354c3e88d

        SHA1

        c0744e11fbc29bc33e0b10d205906a55373cd8e4

        SHA256

        10ba34275255db10bafb3384c6559043cd0b811a6cd4c9d56754f0d3141c50ca

        SHA512

        6fabfea0b635b54f3f2130389ecdb0e7dc785d262b697f9fd7818f4137ca081b6c66fa207889408879ed0e857316000714988ca4c4edf19af2f6d87a364d8262

      • \Users\Admin\Baskov\kernel32.exe

        Filesize

        651.0MB

        MD5

        46f42ebca6a23b350e110f1354c3e88d

        SHA1

        c0744e11fbc29bc33e0b10d205906a55373cd8e4

        SHA256

        10ba34275255db10bafb3384c6559043cd0b811a6cd4c9d56754f0d3141c50ca

        SHA512

        6fabfea0b635b54f3f2130389ecdb0e7dc785d262b697f9fd7818f4137ca081b6c66fa207889408879ed0e857316000714988ca4c4edf19af2f6d87a364d8262

      • memory/580-64-0x0000000000400000-0x00000000004A6000-memory.dmp

        Filesize

        664KB

      • memory/580-72-0x0000000000400000-0x00000000004A6000-memory.dmp

        Filesize

        664KB

      • memory/580-70-0x0000000000400000-0x00000000004A6000-memory.dmp

        Filesize

        664KB

      • memory/580-67-0x0000000000400000-0x00000000004A6000-memory.dmp

        Filesize

        664KB

      • memory/580-68-0x00000000004A0E0E-mapping.dmp

      • memory/828-60-0x0000000000000000-mapping.dmp

      • memory/1008-54-0x0000000075C51000-0x0000000075C53000-memory.dmp

        Filesize

        8KB

      • memory/1008-55-0x0000000000AF1000-0x0000000000AFC000-memory.dmp

        Filesize

        44KB

      • memory/1324-61-0x0000000000000000-mapping.dmp

      • memory/1396-59-0x0000000000000000-mapping.dmp

      • memory/1784-63-0x00000000009F1000-0x00000000009FC000-memory.dmp

        Filesize

        44KB

      • memory/1784-57-0x0000000000000000-mapping.dmp