Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    14/01/2023, 15:37

General

  • Target

    tmp.exe

  • Size

    29.4MB

  • MD5

    8ef684ee2f0d30041d4a089f92f4ab06

  • SHA1

    573aaabccc069703bdf9fab9fd31168303495225

  • SHA256

    1620726a24a49b48d5cc9aa9a26ff4bbe849a4a583031fb8155ec216ddd591a5

  • SHA512

    7a429a21b11f4e9d77e22ed9ae25a7b2f09621edc74b19a6e06849df44e5458477d7510e4ef438e2f674bace8d334777dde4823b8006e09f6849944a768e280d

  • SSDEEP

    786432:zlB8NEuBnbj8cJRPVCZGc7Iv5aMMu8lM9mLAsJpUIL7Rl:JBMkTwc7yaMRR9mnJdL7n

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 9 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\»ðÁú´«Ëµ\tmp.exe
      C:\»ðÁú´«Ëµ\tmp.exe
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:484

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\del.dat

    Filesize

    41B

    MD5

    fa4a6393f371a289f6b187ba6aaada19

    SHA1

    84f4f1eedd713c86f97605f7e8a23a1f2d2678a3

    SHA256

    53ea98bb79bd329140803195f5c46b117986bdeba86f301f9613de657f38b528

    SHA512

    2c6d8429aa7bfb9b2357c3ef710a5d98cd1cb62f29ba36091ddf4a05fe28cc7b35a4609aa7cd1e1f59350c004e2ab9f1c18cc2506bde92f64d6fa3413e0a0519

  • C:\Users\Admin\AppData\Local\Temp\ee3be600d9a3cee93b3631c5a8597615

    Filesize

    12B

    MD5

    31faed83df2eca847735542ee9b1b7e5

    SHA1

    979d00621b850712b39786ee3ab7e15cadf6bcb0

    SHA256

    8fad92805acff624ee904cad8e79d6ba3df21a053f6092d7d6851f7ffcee67a9

    SHA512

    c3ec17ec5fb051058b23b16ac95a118cd86940135ba65097ef88a9d2089e2cbfe611cd3c7587ed538e8df4d6425f71cd78eda7040b70beabe0fabb9e6729874a

  • C:\»ðÁú´«Ëµ\tmp.exe

    Filesize

    29.4MB

    MD5

    8ef684ee2f0d30041d4a089f92f4ab06

    SHA1

    573aaabccc069703bdf9fab9fd31168303495225

    SHA256

    1620726a24a49b48d5cc9aa9a26ff4bbe849a4a583031fb8155ec216ddd591a5

    SHA512

    7a429a21b11f4e9d77e22ed9ae25a7b2f09621edc74b19a6e06849df44e5458477d7510e4ef438e2f674bace8d334777dde4823b8006e09f6849944a768e280d

  • C:\»ðÁú´«Ëµ\tmp.exe

    Filesize

    29.4MB

    MD5

    8ef684ee2f0d30041d4a089f92f4ab06

    SHA1

    573aaabccc069703bdf9fab9fd31168303495225

    SHA256

    1620726a24a49b48d5cc9aa9a26ff4bbe849a4a583031fb8155ec216ddd591a5

    SHA512

    7a429a21b11f4e9d77e22ed9ae25a7b2f09621edc74b19a6e06849df44e5458477d7510e4ef438e2f674bace8d334777dde4823b8006e09f6849944a768e280d

  • \»ðÁú´«Ëµ\tmp.exe

    Filesize

    29.4MB

    MD5

    8ef684ee2f0d30041d4a089f92f4ab06

    SHA1

    573aaabccc069703bdf9fab9fd31168303495225

    SHA256

    1620726a24a49b48d5cc9aa9a26ff4bbe849a4a583031fb8155ec216ddd591a5

    SHA512

    7a429a21b11f4e9d77e22ed9ae25a7b2f09621edc74b19a6e06849df44e5458477d7510e4ef438e2f674bace8d334777dde4823b8006e09f6849944a768e280d

  • memory/484-64-0x0000000000400000-0x00000000013E0000-memory.dmp

    Filesize

    15.9MB

  • memory/484-65-0x0000000000400000-0x00000000013E0000-memory.dmp

    Filesize

    15.9MB

  • memory/484-67-0x0000000003130000-0x00000000031B3000-memory.dmp

    Filesize

    524KB

  • memory/484-72-0x0000000000400000-0x00000000013E0000-memory.dmp

    Filesize

    15.9MB

  • memory/1244-54-0x0000000075291000-0x0000000075293000-memory.dmp

    Filesize

    8KB

  • memory/1244-63-0x0000000004330000-0x0000000005310000-memory.dmp

    Filesize

    15.9MB

  • memory/1244-68-0x0000000000400000-0x00000000013E0000-memory.dmp

    Filesize

    15.9MB

  • memory/1244-58-0x0000000001430000-0x00000000014B3000-memory.dmp

    Filesize

    524KB

  • memory/1244-55-0x0000000000400000-0x00000000013E0000-memory.dmp

    Filesize

    15.9MB

  • memory/1244-56-0x0000000000400000-0x00000000013E0000-memory.dmp

    Filesize

    15.9MB