Analysis

  • max time kernel
    38s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2023 00:34

General

  • Target

    まりあ [Maria] 純真無垢Part4[IMOG-182][60fps].mkv.torrent

  • Size

    14KB

  • MD5

    544377cce3664d9cf1fa40076d163692

  • SHA1

    80698ed0326a65a6db6e39b3cdaf17a070566baf

  • SHA256

    09bb049cc4eeb25cc5890fe7f776dc76a333bd0da2c1099672508880de547845

  • SHA512

    27d7f5c2d3f166eb55efcbc0208414436c13b343dc8e91c17ca0a20d6fb04448f78c24aab6a9bc4156980cfcaaec3823dd0f5b32ef968ec695cc1ed737de12fd

  • SSDEEP

    384:nhn9nQhjrpbUsCcNZHDSt/amozJVjbKvuRMFbxXrB8:Yh5TrHDmozJVCmRMRq

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 10 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\まりあ [Maria] 純真無垢Part4[IMOG-182][60fps].mkv.torrent"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\まりあ [Maria] 純真無垢Part4[IMOG-182][60fps].mkv.torrent
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\まりあ [Maria] 純真無垢Part4[IMOG-182][60fps].mkv.torrent"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:1700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1108-76-0x0000000000000000-mapping.dmp

  • memory/1700-81-0x0000000000000000-mapping.dmp

  • memory/1700-82-0x0000000075511000-0x0000000075513000-memory.dmp

    Filesize

    8KB

  • memory/2040-54-0x000007FEFBFB1000-0x000007FEFBFB3000-memory.dmp

    Filesize

    8KB