Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/03/2023, 05:05

General

  • Target

    ebe1461efc6d3c59317952b362dea27082c493ce5e0b21fc501c8d8b1e1ca0eb.exe

  • Size

    1.6MB

  • MD5

    b6c64113705e6a47fae4030961e351ec

  • SHA1

    4cc602102278574a3bd42fd2e21d5faeb27bf8bb

  • SHA256

    ebe1461efc6d3c59317952b362dea27082c493ce5e0b21fc501c8d8b1e1ca0eb

  • SHA512

    f7a5e4fa408f8326c039662051421b393d7d009a8bfede71f0454603ea0c42cc35c5195ef6fda948620fc7fbd5112d0e9c92a9c858b815911d5384b9ba473303

  • SSDEEP

    24576:PgZXoZUTVdt7K7Ubwx1YiPuC8W1xfs568qtyz+V5zeX1LnGLz8oDEv7Q72y0f:u5wxiiP8Ux0k7yCz+tnoooDETQMf

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebe1461efc6d3c59317952b362dea27082c493ce5e0b21fc501c8d8b1e1ca0eb.exe
    "C:\Users\Admin\AppData\Local\Temp\ebe1461efc6d3c59317952b362dea27082c493ce5e0b21fc501c8d8b1e1ca0eb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" .\hT9zY.3WT
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\hT9zY.3WT
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\hT9zY.3WT
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2676
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\hT9zY.3WT
            5⤵
            • Loads dropped DLL
            PID:2712

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hT9zY.3WT

          Filesize

          1.1MB

          MD5

          d85fe44b916c1c501f0d771db7fb00dc

          SHA1

          901a0281382606c6465cae323ae1ce42704b54a8

          SHA256

          c52cc0e072edf05e9556a6a99685c9f7736fb554b4660458755599a56d9d5952

          SHA512

          4c7fb0488a6494146eb9adfffa4a1073135ca31ce00e9e596695418b099764ca3fc5b6c33ff04e26ab483d76bd6b7ff886befb364ad24253c61e9d96f139a17d

        • \Users\Admin\AppData\Local\Temp\hT9zY.3wT

          Filesize

          1.1MB

          MD5

          d85fe44b916c1c501f0d771db7fb00dc

          SHA1

          901a0281382606c6465cae323ae1ce42704b54a8

          SHA256

          c52cc0e072edf05e9556a6a99685c9f7736fb554b4660458755599a56d9d5952

          SHA512

          4c7fb0488a6494146eb9adfffa4a1073135ca31ce00e9e596695418b099764ca3fc5b6c33ff04e26ab483d76bd6b7ff886befb364ad24253c61e9d96f139a17d

        • \Users\Admin\AppData\Local\Temp\hT9zY.3wT

          Filesize

          1.1MB

          MD5

          d85fe44b916c1c501f0d771db7fb00dc

          SHA1

          901a0281382606c6465cae323ae1ce42704b54a8

          SHA256

          c52cc0e072edf05e9556a6a99685c9f7736fb554b4660458755599a56d9d5952

          SHA512

          4c7fb0488a6494146eb9adfffa4a1073135ca31ce00e9e596695418b099764ca3fc5b6c33ff04e26ab483d76bd6b7ff886befb364ad24253c61e9d96f139a17d

        • \Users\Admin\AppData\Local\Temp\hT9zY.3wT

          Filesize

          1.1MB

          MD5

          d85fe44b916c1c501f0d771db7fb00dc

          SHA1

          901a0281382606c6465cae323ae1ce42704b54a8

          SHA256

          c52cc0e072edf05e9556a6a99685c9f7736fb554b4660458755599a56d9d5952

          SHA512

          4c7fb0488a6494146eb9adfffa4a1073135ca31ce00e9e596695418b099764ca3fc5b6c33ff04e26ab483d76bd6b7ff886befb364ad24253c61e9d96f139a17d

        • memory/2332-136-0x0000000004800000-0x00000000048C9000-memory.dmp

          Filesize

          804KB

        • memory/2332-131-0x0000000000FA0000-0x0000000000FA6000-memory.dmp

          Filesize

          24KB

        • memory/2332-132-0x0000000004710000-0x00000000047EF000-memory.dmp

          Filesize

          892KB

        • memory/2332-133-0x0000000004800000-0x00000000048C9000-memory.dmp

          Filesize

          804KB

        • memory/2332-129-0x00000000043D0000-0x00000000044EB000-memory.dmp

          Filesize

          1.1MB

        • memory/2332-137-0x0000000004800000-0x00000000048C9000-memory.dmp

          Filesize

          804KB

        • memory/2332-128-0x00000000043D0000-0x00000000044EB000-memory.dmp

          Filesize

          1.1MB

        • memory/2712-139-0x0000000000400000-0x000000000051B000-memory.dmp

          Filesize

          1.1MB

        • memory/2712-141-0x0000000002FF0000-0x0000000002FF6000-memory.dmp

          Filesize

          24KB

        • memory/2712-142-0x0000000005350000-0x000000000542F000-memory.dmp

          Filesize

          892KB

        • memory/2712-143-0x0000000005430000-0x00000000054F9000-memory.dmp

          Filesize

          804KB

        • memory/2712-146-0x0000000005430000-0x00000000054F9000-memory.dmp

          Filesize

          804KB

        • memory/2712-147-0x0000000005430000-0x00000000054F9000-memory.dmp

          Filesize

          804KB