Analysis

  • max time kernel
    70s
  • max time network
    70s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2023 21:59

General

  • Target

    Andromeda v2.06.rar

  • Size

    2.8MB

  • MD5

    4ac6d9cbf29c6000d5eb9f2845f7048a

  • SHA1

    12f73a6897bb79d17dbf1615254e96bb0b5fad00

  • SHA256

    0cf3e8db566d34f19d7c2df598f038542439d1f48e4b228d04c0a5469a62290b

  • SHA512

    1c70aed02b0d107c93d99b0d03733133d47ecefb310f54996be19b9f91c62725f9eb41951c0a4a26c09f30235ee0752324eac5519fae7c44cba4c1fad9832eda

  • SSDEEP

    49152:1nLD6q6AM/sBzTmNX7FvoZZ//STJHD8udOgWjswIcONO4F6zUgwKN2Bq0gc5/+Z+:R6q6AM+iX79oL//STFDOF4w4UUS7c5y+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Andromeda v2.06.rar"
    1⤵
    • Modifies registry class
    PID:4112
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Andromeda v2.06.rar"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1124
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4908
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\Andromeda v2.06\" -spe -an -ai#7zMap7570:110:7zEvent24142
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:928
    • C:\Users\Admin\AppData\Local\Temp\Andromeda v2.06\Andromeda Builder.exe
      "C:\Users\Admin\AppData\Local\Temp\Andromeda v2.06\Andromeda Builder.exe"
      1⤵
      • Executes dropped EXE
      PID:1976
    • C:\Users\Admin\AppData\Local\Temp\Andromeda v2.06\Andromeda Builder.exe
      "C:\Users\Admin\AppData\Local\Temp\Andromeda v2.06\Andromeda Builder.exe"
      1⤵
      • Executes dropped EXE
      PID:3980

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db
      Filesize

      28KB

      MD5

      24e9eaef15b6549418ad25af9fb66c4c

      SHA1

      ab729974410afad42314f04c512a462093ca42da

      SHA256

      d1b2f9a043b589ac0fb2ac3320b098aa648138466d28632049179d2840bfd907

      SHA512

      abf6dce1388d15a7bdc5d272e204911b4303668220ad3caf86cc2420405b59ad6d24a4809b106736bbb1f9271fef518c0b2aecda9d420adaf17aae38c4c44c58

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db
      Filesize

      28KB

      MD5

      24e9eaef15b6549418ad25af9fb66c4c

      SHA1

      ab729974410afad42314f04c512a462093ca42da

      SHA256

      d1b2f9a043b589ac0fb2ac3320b098aa648138466d28632049179d2840bfd907

      SHA512

      abf6dce1388d15a7bdc5d272e204911b4303668220ad3caf86cc2420405b59ad6d24a4809b106736bbb1f9271fef518c0b2aecda9d420adaf17aae38c4c44c58

    • C:\Users\Admin\AppData\Local\Temp\Andromeda v2.06\Andromeda Builder.exe
      Filesize

      1.3MB

      MD5

      be31dede2df4ba25eeb71b191a3512ba

      SHA1

      0d6ef1e4662eb0d624a395afe3e8c16a5f57be4d

      SHA256

      2089c3234f1808f2f729407fbec57e42f0cae79590b7e386b8ee2e18e0252f97

      SHA512

      c51a4b62e69467e6ddab21bfe452d41c0da376a14d3e1d4d16feefb60874b3efd76971df87e392c6d66bef6cffdf7dddede42c4c04172ef50a75761835ce2b57

    • C:\Users\Admin\AppData\Local\Temp\Andromeda v2.06\Andromeda Builder.exe
      Filesize

      1.3MB

      MD5

      be31dede2df4ba25eeb71b191a3512ba

      SHA1

      0d6ef1e4662eb0d624a395afe3e8c16a5f57be4d

      SHA256

      2089c3234f1808f2f729407fbec57e42f0cae79590b7e386b8ee2e18e0252f97

      SHA512

      c51a4b62e69467e6ddab21bfe452d41c0da376a14d3e1d4d16feefb60874b3efd76971df87e392c6d66bef6cffdf7dddede42c4c04172ef50a75761835ce2b57

    • C:\Users\Admin\AppData\Local\Temp\Andromeda v2.06\Andromeda Builder.exe
      Filesize

      1.3MB

      MD5

      be31dede2df4ba25eeb71b191a3512ba

      SHA1

      0d6ef1e4662eb0d624a395afe3e8c16a5f57be4d

      SHA256

      2089c3234f1808f2f729407fbec57e42f0cae79590b7e386b8ee2e18e0252f97

      SHA512

      c51a4b62e69467e6ddab21bfe452d41c0da376a14d3e1d4d16feefb60874b3efd76971df87e392c6d66bef6cffdf7dddede42c4c04172ef50a75761835ce2b57

    • memory/1976-196-0x0000000000400000-0x0000000000551000-memory.dmp
      Filesize

      1.3MB

    • memory/1976-197-0x00000000776F0000-0x0000000077905000-memory.dmp
      Filesize

      2.1MB

    • memory/1976-2626-0x0000000075F70000-0x0000000076110000-memory.dmp
      Filesize

      1.6MB

    • memory/3980-1660-0x00000000776F0000-0x0000000077905000-memory.dmp
      Filesize

      2.1MB

    • memory/3980-1669-0x0000000000400000-0x0000000000551000-memory.dmp
      Filesize

      1.3MB