Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2023, 20:20

General

  • Target

    9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe

  • Size

    1.5MB

  • MD5

    ed89f4245dbc0d3d6ce217eaf03c7905

  • SHA1

    ab19db8237ef88e3fff7f35a98277d618be95005

  • SHA256

    9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a

  • SHA512

    426e5842df72759a1807fe78f5e2d12d06b70ed7f8cde5f16df1500470db72af076adc92c3abf932eed95a810bac11daaebabff75154de6a772bd01fc5c7eab1

  • SSDEEP

    24576:din21YorzjJGRnp110omtDTAuLYiK+sUThY5zuYY0ybi6X27Oj/5VN+X+lzSvCeH:dFYorzjJsnp1107K+Lq5zujjX2G5VkXa

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe
    "C:\Users\Admin\AppData\Local\Temp\9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c start C:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\8i7j46g5v4qvx087804h6wb4.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4864
      • C:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\8i7j46g5v4qvx087804h6wb4.exe
        C:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\8i7j46g5v4qvx087804h6wb4.exe
        3⤵
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:5028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\8i7j46g5v4qvx087804h6wb4.data

    Filesize

    254B

    MD5

    29bf9df6ec8080465a0ca943ffacedad

    SHA1

    976808f77d83425161ae080dcef7c85b05ebc7cd

    SHA256

    cc8c4d794df2254e51feb25fb75db040102da9ec206e161ab99dd0e3667755a8

    SHA512

    9cc4049ea872c2137ec8082f7061d67f9c5ec1d32f6b1dd6e76f2d228922480c4a9274c6cfb50b1248336bbd50463c3469c62e664f5c55ef5186655c71aedd31

  • C:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\8i7j46g5v4qvx087804h6wb4.exe

    Filesize

    901KB

    MD5

    b4479909bd3f46e29d8df4a970765282

    SHA1

    1bdd7c6a89adfa0f518f5d929bd7df86256df117

    SHA256

    26fe42ac969f3a20ca56acec614c3a33ba8ed37582a684bb4922781e83418fb8

    SHA512

    d9543a05b6f1de92266e7b31c3314242c4855fb6961d3f8b14778cad14c56a6928d2b29fa217f7088f4abedff9aa0c21cdaa83076ba43504b425813b132372c4

  • C:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\8i7j46g5v4qvx087804h6wb4.exe

    Filesize

    901KB

    MD5

    b4479909bd3f46e29d8df4a970765282

    SHA1

    1bdd7c6a89adfa0f518f5d929bd7df86256df117

    SHA256

    26fe42ac969f3a20ca56acec614c3a33ba8ed37582a684bb4922781e83418fb8

    SHA512

    d9543a05b6f1de92266e7b31c3314242c4855fb6961d3f8b14778cad14c56a6928d2b29fa217f7088f4abedff9aa0c21cdaa83076ba43504b425813b132372c4

  • C:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\ttpcomm.dll

    Filesize

    368KB

    MD5

    428a44d102eb8003421164780a83020c

    SHA1

    8eb4cc4ad53c83ab21e487eb59d957bf43e32622

    SHA256

    2cea85f0678a4a763d4b21d0828057ceac4a13e6e5f27003a37c6a14a1f0bd10

    SHA512

    0f7784ae3515f8006e5f312f3e650aa6dd00dd90eb1b4dc3faa2e4a69a84b9af0450017794a3500310dc362d305d0d7d281658bb306ba7ebeb994d332da5cba9

  • C:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\ttpcomm.dll

    Filesize

    368KB

    MD5

    428a44d102eb8003421164780a83020c

    SHA1

    8eb4cc4ad53c83ab21e487eb59d957bf43e32622

    SHA256

    2cea85f0678a4a763d4b21d0828057ceac4a13e6e5f27003a37c6a14a1f0bd10

    SHA512

    0f7784ae3515f8006e5f312f3e650aa6dd00dd90eb1b4dc3faa2e4a69a84b9af0450017794a3500310dc362d305d0d7d281658bb306ba7ebeb994d332da5cba9

  • memory/5028-144-0x0000000003E40000-0x0000000003EA4000-memory.dmp

    Filesize

    400KB

  • memory/5028-147-0x0000000003EF0000-0x0000000003F17000-memory.dmp

    Filesize

    156KB

  • memory/5028-138-0x0000000000B00000-0x0000000000BEC000-memory.dmp

    Filesize

    944KB

  • memory/5028-141-0x00000000036F0000-0x000000000398B000-memory.dmp

    Filesize

    2.6MB

  • memory/5028-142-0x00000000036F0000-0x000000000398B000-memory.dmp

    Filesize

    2.6MB

  • memory/5028-143-0x0000000004220000-0x0000000004314000-memory.dmp

    Filesize

    976KB

  • memory/5028-145-0x0000000004220000-0x0000000004314000-memory.dmp

    Filesize

    976KB

  • memory/5028-146-0x00000000046B0000-0x0000000004827000-memory.dmp

    Filesize

    1.5MB

  • memory/5028-139-0x0000000000AC0000-0x0000000000CD0000-memory.dmp

    Filesize

    2.1MB

  • memory/5028-148-0x0000000003EF1000-0x0000000003F0E000-memory.dmp

    Filesize

    116KB

  • memory/5028-149-0x0000000000AC0000-0x0000000000CD0000-memory.dmp

    Filesize

    2.1MB

  • memory/5028-150-0x0000000004420000-0x00000000044EE000-memory.dmp

    Filesize

    824KB

  • memory/5028-151-0x00000000046B0000-0x0000000004827000-memory.dmp

    Filesize

    1.5MB

  • memory/5028-152-0x0000000003C70000-0x0000000003CC2000-memory.dmp

    Filesize

    328KB

  • memory/5028-153-0x00000000036F0000-0x000000000398B000-memory.dmp

    Filesize

    2.6MB

  • memory/5028-154-0x0000000003E40000-0x0000000003EA4000-memory.dmp

    Filesize

    400KB

  • memory/5028-155-0x0000000004220000-0x0000000004314000-memory.dmp

    Filesize

    976KB

  • memory/5028-156-0x0000000004420000-0x00000000044EE000-memory.dmp

    Filesize

    824KB

  • memory/5028-157-0x00000000046B0000-0x0000000004827000-memory.dmp

    Filesize

    1.5MB