Analysis

  • max time kernel
    86s
  • max time network
    88s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/03/2023, 05:39

General

  • Target

    7eff29fafb054914497723206e0c52b2752d59c0d4d4947d9c2e7f91f1a7e95b.exe

  • Size

    1.5MB

  • MD5

    4eeba60accc1c5d747d1af8eca636ec8

  • SHA1

    d46b21e6ae97ee02f36dd1ad93afd31d9b768f64

  • SHA256

    7eff29fafb054914497723206e0c52b2752d59c0d4d4947d9c2e7f91f1a7e95b

  • SHA512

    abc09a8ae77d42f52a3644132d4c3f4c076e2adba476f7dda51ffddd2b9b7b8221c9164816c2b41e6d1591893c97da09d99114b1ee88bdac73c30c22da069977

  • SSDEEP

    24576:9GHCm8uPdJmX2pclzjEVpcd4iSCP3BgaDDg6bvJ+brq8/Gf9TJL+rP7dLzHdJxs:EuWxpqBZSCBhDg6bBj8/Gf9VLw7932

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7eff29fafb054914497723206e0c52b2752d59c0d4d4947d9c2e7f91f1a7e95b.exe
    "C:\Users\Admin\AppData\Local\Temp\7eff29fafb054914497723206e0c52b2752d59c0d4d4947d9c2e7f91f1a7e95b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3956
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -U FOQr.RQ -S
      2⤵
      • Loads dropped DLL
      PID:4284

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FOQr.RQ

    Filesize

    1.2MB

    MD5

    c0f51377bf47c5c06b7ae2cc2d28231a

    SHA1

    e5907b0018763d22eedb7ca28d581c468571d30d

    SHA256

    73e9325798562af6a6e21700e269bc5e6a38792d9588fbc4009688efa4b5a2eb

    SHA512

    b5a8bb9a339a76b071ab75038d4d1198e4e496a1b49cf3dc86b8ad4c60c2a3ef54a0544cf598d2a430ec6f6dcdc99cc886ab4ff4c427aeaa792e04505a1d7c73

  • \Users\Admin\AppData\Local\Temp\foQr.RQ

    Filesize

    1.2MB

    MD5

    c0f51377bf47c5c06b7ae2cc2d28231a

    SHA1

    e5907b0018763d22eedb7ca28d581c468571d30d

    SHA256

    73e9325798562af6a6e21700e269bc5e6a38792d9588fbc4009688efa4b5a2eb

    SHA512

    b5a8bb9a339a76b071ab75038d4d1198e4e496a1b49cf3dc86b8ad4c60c2a3ef54a0544cf598d2a430ec6f6dcdc99cc886ab4ff4c427aeaa792e04505a1d7c73

  • memory/4284-125-0x0000000000400000-0x0000000000534000-memory.dmp

    Filesize

    1.2MB

  • memory/4284-127-0x0000000003240000-0x0000000003246000-memory.dmp

    Filesize

    24KB

  • memory/4284-128-0x0000000004F00000-0x0000000004FF9000-memory.dmp

    Filesize

    996KB

  • memory/4284-129-0x0000000005000000-0x00000000050E1000-memory.dmp

    Filesize

    900KB

  • memory/4284-132-0x0000000005000000-0x00000000050E1000-memory.dmp

    Filesize

    900KB

  • memory/4284-133-0x0000000005000000-0x00000000050E1000-memory.dmp

    Filesize

    900KB