Analysis

  • max time kernel
    139s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2023, 01:41

General

  • Target

    BetternetForWindows.exe

  • Size

    621KB

  • MD5

    8c192cfbfe08e5c362dddafd8e0e9c13

  • SHA1

    8faf6cd8c02271d86ed86b3defa2c9aaa3a4ba3c

  • SHA256

    585c1ffefbcbbae5811c68424e54d24147ce28138c0740dae5e86ce66aec1686

  • SHA512

    b3a330a0af8970e062700bdab30f12547fcf6e44eebc7e7f5cbd0c4966eba0aa4865d390b81bf2899c4a6deeedf80f19465c922f1b3df1228bec2f0c8699c9f8

  • SSDEEP

    6144:3Ya6thzb4aJJgrokyfmVwA8WALhg5TAvKuc79Nnu83aPTUA+C5+YR/ZXo8Vgy93V:3YD5bVJJgrjyi8fAUSuKVKPh+EBZX1Am

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BetternetForWindows.exe
    "C:\Users\Admin\AppData\Local\Temp\BetternetForWindows.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Users\Admin\AppData\Local\Temp\nsy12C.tmp\Betternet.WebInstaller.exe
      "C:\Users\Admin\AppData\Local\Temp\nsy12C.tmp\Betternet.WebInstaller.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
        dw20.exe -x -s 1612
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        PID:1812

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsy12C.tmp\Betternet.WebInstaller.exe

          Filesize

          354KB

          MD5

          f8f4bf622cf28ea87802404696a496b3

          SHA1

          d9866362c0c8413fe9ba3a7adf985805b95cd7a1

          SHA256

          712a0c6456f831ed47be38e52e31d0536992611e41dbd7c9b9fc87f08ee89c72

          SHA512

          8f8c30f8a6ec4011ce1219ee008fc42cbed726864a82d8922f4b571f828b7803fe095a5a47b48126b76833609cdb9685d84d20273b8d197d56678f051d2e4074

        • C:\Users\Admin\AppData\Local\Temp\nsy12C.tmp\Betternet.WebInstaller.exe

          Filesize

          354KB

          MD5

          f8f4bf622cf28ea87802404696a496b3

          SHA1

          d9866362c0c8413fe9ba3a7adf985805b95cd7a1

          SHA256

          712a0c6456f831ed47be38e52e31d0536992611e41dbd7c9b9fc87f08ee89c72

          SHA512

          8f8c30f8a6ec4011ce1219ee008fc42cbed726864a82d8922f4b571f828b7803fe095a5a47b48126b76833609cdb9685d84d20273b8d197d56678f051d2e4074

        • C:\Users\Admin\AppData\Local\Temp\nsy12C.tmp\Betternet.WebInstaller.exe.config

          Filesize

          332B

          MD5

          b5216c3af56142ca8618d4c9b72fba6e

          SHA1

          f91430650ffe1e0f11f0695617d80d30956d2067

          SHA256

          5f0d941557aebc77e55d0b0af4d0b17e11f3bdee6df5b60651061e027f90d76d

          SHA512

          af6de69853d42f06ebeee6185ead238f7ade4cbd026ac166d4fc313d97e1eb83c1b215010fc12abefc871c237d50abe4bea241477850b8705a187ec146308743

        • C:\Users\Admin\AppData\Local\Temp\nsy12C.tmp\Newtonsoft.Json.dll

          Filesize

          493KB

          MD5

          1390b082700afc53a7aa320f3259325e

          SHA1

          8f72572ad084ef145fd3286930af6b70ba622384

          SHA256

          7beb6a951b92af14322a382cf105fff8d0dc63518b33556b98e09daca0cb6d07

          SHA512

          ace3b9548bb8d29805673ac4611a141e4c026c5d09a63bd399f904d28ea274f9e0ff682b99adce25a66ccdd7e3f03e0a45ca9ae0a67e88d9d1c83cb34180b8d6

        • C:\Users\Admin\AppData\Local\Temp\nsy12C.tmp\Vpn.WebInstaller.Common.dll

          Filesize

          192KB

          MD5

          1d9d6a640d31a1807bea270d0a39c141

          SHA1

          8e3ae3a3da1a337696133908a57fb5df2e6a0e13

          SHA256

          ecd52311dfdb1c95cbabb93d672875ac842c7c58b64985c31c3d0a69c38c807e

          SHA512

          7e9d12acf3aec2af7d5e9cee60ff0f0938766e9bc18fa5375876e11f582f61036de5c51e79e8dc9b5f1456180951774081d76473682ef7877a9f282c548dcf4c

        • \Users\Admin\AppData\Local\Temp\nsy12C.tmp\Betternet.WebInstaller.exe

          Filesize

          354KB

          MD5

          f8f4bf622cf28ea87802404696a496b3

          SHA1

          d9866362c0c8413fe9ba3a7adf985805b95cd7a1

          SHA256

          712a0c6456f831ed47be38e52e31d0536992611e41dbd7c9b9fc87f08ee89c72

          SHA512

          8f8c30f8a6ec4011ce1219ee008fc42cbed726864a82d8922f4b571f828b7803fe095a5a47b48126b76833609cdb9685d84d20273b8d197d56678f051d2e4074

        • memory/944-54-0x0000000075491000-0x0000000075493000-memory.dmp

          Filesize

          8KB

        • memory/1444-60-0x000007FEF3940000-0x000007FEF4363000-memory.dmp

          Filesize

          10.1MB

        • memory/1444-62-0x000007FEF2970000-0x000007FEF393A000-memory.dmp

          Filesize

          15.8MB

        • memory/1444-63-0x000007FEED8B0000-0x000007FEEEB03000-memory.dmp

          Filesize

          18.3MB

        • memory/1444-66-0x0000000000B36000-0x0000000000B55000-memory.dmp

          Filesize

          124KB

        • memory/1444-69-0x0000000000B36000-0x0000000000B55000-memory.dmp

          Filesize

          124KB

        • memory/1812-68-0x000007FEFBDD1000-0x000007FEFBDD3000-memory.dmp

          Filesize

          8KB