Analysis

  • max time kernel
    123s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    15-01-2023 23:47

General

  • Target

    FrostyModManager.exe

  • Size

    506KB

  • MD5

    ce2e89ab7ba7e003af3feb74ec0d1a20

  • SHA1

    6861071664db9fd994d6c4bbddb5e2be192a9e98

  • SHA256

    8fcdb7659bc77b23f374e6eb89427c8dda7727a25c8a8bca3bdf494fd1c801db

  • SHA512

    9044e40e37c37d1ffac9890d7bf1a7093c8043231fd49945d38beee849b26cdccd2c20e3d7af6d2bd096e125776b1b8a28dad385eb468bf49d0edb6d7c74710c

  • SSDEEP

    3072:8+Uv+M/88jAku6tIUpoHopGg1DSnACXdS2YUFsviH8zQq/fgSR0pm/fOiC5c2r:VUvpBOE1OnHXYUsaH8zf/ISR0pm/Gy2

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FrostyModManager.exe
    "C:\Users\Admin\AppData\Local\Temp\FrostyModManager.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4772
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 456 -p 4840 -ip 4840
    1⤵
      PID:1408
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 4840 -s 2476
      1⤵
      • Program crash
      PID:4372

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4772-132-0x00000190E25F0000-0x00000190E2674000-memory.dmp
      Filesize

      528KB

    • memory/4772-133-0x00007FF8E59B0000-0x00007FF8E6471000-memory.dmp
      Filesize

      10.8MB

    • memory/4772-134-0x00000190FF720000-0x00000190FFD0E000-memory.dmp
      Filesize

      5.9MB

    • memory/4772-135-0x00000190FF3D0000-0x00000190FF662000-memory.dmp
      Filesize

      2.6MB

    • memory/4772-136-0x00000190FFD10000-0x00000190FFE12000-memory.dmp
      Filesize

      1.0MB

    • memory/4772-137-0x00000190FCA50000-0x00000190FCA6C000-memory.dmp
      Filesize

      112KB

    • memory/4772-138-0x00000190E2B60000-0x00000190E2B6E000-memory.dmp
      Filesize

      56KB

    • memory/4772-139-0x00000190FCA30000-0x00000190FCA38000-memory.dmp
      Filesize

      32KB

    • memory/4772-140-0x00000190FCB00000-0x00000190FCB42000-memory.dmp
      Filesize

      264KB

    • memory/4772-141-0x00000190FCA90000-0x00000190FCAAA000-memory.dmp
      Filesize

      104KB

    • memory/4772-142-0x00000190FFF10000-0x00000190FFFC0000-memory.dmp
      Filesize

      704KB

    • memory/4772-143-0x00000190FCB80000-0x00000190FCBA2000-memory.dmp
      Filesize

      136KB

    • memory/4772-144-0x00000190FF6C0000-0x00000190FF706000-memory.dmp
      Filesize

      280KB

    • memory/4772-145-0x00007FF8E59B0000-0x00007FF8E6471000-memory.dmp
      Filesize

      10.8MB

    • memory/4772-146-0x00000190FCB50000-0x00000190FCB70000-memory.dmp
      Filesize

      128KB

    • memory/4772-147-0x00000190FCAC0000-0x00000190FCAC8000-memory.dmp
      Filesize

      32KB

    • memory/4772-148-0x00000190FFFC0000-0x00000190FFFF8000-memory.dmp
      Filesize

      224KB

    • memory/4772-149-0x00000190FCAD0000-0x00000190FCADE000-memory.dmp
      Filesize

      56KB