Resubmissions

02-02-2023 15:10

230202-skgffsad87 10

30-01-2023 21:04

230130-zwmj6scg96 9

30-01-2023 19:19

230130-x1h2faca82 9

30-01-2023 19:18

230130-x1d3gsdf2v 9

30-01-2023 19:16

230130-xytp6ade61 9

30-01-2023 16:57

230130-vgczzabb95 9

Analysis

  • max time kernel
    139s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    30-01-2023 16:57

General

  • Target

    1db93ee81050da0ba413543f9fbc388499a466792f9a54ea6f1bbdb712ba9690.exe

  • Size

    1.5MB

  • MD5

    fee7c379f3a555c5c821e872ec384a91

  • SHA1

    7346e2e29faddd63ae5c610c07acab46b2b1b176

  • SHA256

    1db93ee81050da0ba413543f9fbc388499a466792f9a54ea6f1bbdb712ba9690

  • SHA512

    5daecbea4102f9b6c431afa1d6d5bb196594e7c9640d7a8b388669268d737d6e4277797504a86169b410ccf3cd6e92e0c55065d15a495a398bc27607567d1497

  • SSDEEP

    24576:uSR66R9LwWCc9FFZUZVClJYkLbdf/nixuiO4DGDGW3628rKR1q+ClmJcpd++GMzr:uQvL9SWTVilyfMFo8D1b

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Drops file in Drivers directory 39 IoCs
  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1db93ee81050da0ba413543f9fbc388499a466792f9a54ea6f1bbdb712ba9690.exe
    "C:\Users\Admin\AppData\Local\Temp\1db93ee81050da0ba413543f9fbc388499a466792f9a54ea6f1bbdb712ba9690.exe"
    1⤵
    • Drops file in Drivers directory
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1156
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1720
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -u -p 1236 -s 988
    1⤵
    • Program crash
    PID:1528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1156-54-0x0000000000000000-mapping.dmp