Analysis

  • max time kernel
    41s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2023, 06:41

General

  • Target

    27468acab51385729738be5172ef5ce1.bin.exe

  • Size

    6.6MB

  • MD5

    27468acab51385729738be5172ef5ce1

  • SHA1

    22cc8976f07200c5f013f4dac189a76b7f369b5c

  • SHA256

    f6fcb47d058b863e2926e0a24ea1c6bb94effe34858b029aabfbfd457fa3c7c4

  • SHA512

    0d87628a696c7d8ee04258b1f4b184f661d94fb0a0e7fdc12ede30825acdf1fa0359802a0c21a637fb695ff6f87be10f7afdeb6fa9eace25ae2da486c9867bf6

  • SSDEEP

    49152:Dj7nD9DEBcaKIG081IITIklIfgUVjWKQB+yCwLJYq2GQhJf4YiL1eGmJZa6HEydF:

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA0AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:952
    • C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
      C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
      2⤵
        PID:1492
      • C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
        C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
        2⤵
          PID:1156
        • C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
          C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
          2⤵
            PID:544
          • C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
            C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
            2⤵
              PID:1128
            • C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
              C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
              2⤵
                PID:876
              • C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
                C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
                2⤵
                  PID:556
                • C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
                  C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
                  2⤵
                    PID:1032
                  • C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
                    C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
                    2⤵
                      PID:852
                    • C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
                      C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
                      2⤵
                        PID:428
                      • C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
                        C:\Users\Admin\AppData\Local\Temp\27468acab51385729738be5172ef5ce1.bin.exe
                        2⤵
                          PID:1228

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/952-60-0x0000000002600000-0x0000000002640000-memory.dmp

                        Filesize

                        256KB

                      • memory/952-61-0x0000000002600000-0x0000000002640000-memory.dmp

                        Filesize

                        256KB

                      • memory/952-62-0x0000000002600000-0x0000000002640000-memory.dmp

                        Filesize

                        256KB

                      • memory/952-63-0x0000000002600000-0x0000000002640000-memory.dmp

                        Filesize

                        256KB

                      • memory/2016-54-0x0000000000360000-0x00000000009FC000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/2016-55-0x0000000006330000-0x00000000067EA000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2016-56-0x0000000004A70000-0x0000000004AB0000-memory.dmp

                        Filesize

                        256KB

                      • memory/2016-57-0x0000000000B80000-0x0000000000C12000-memory.dmp

                        Filesize

                        584KB