Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-03-2023 11:17

General

  • Target

    g1wxxdmz.exe

  • Size

    1.7MB

  • MD5

    3ee020029ff565966fcaa7945046ba2e

  • SHA1

    e77da75107a3b45226fcae0ab9f1be2ab678005b

  • SHA256

    1f1b5c216688dca0d9e9dbabde3325226e064ce2a1534e86bd0c00785f37eeab

  • SHA512

    d070d20ee6b1b8b4c9407bc3f6cd6acd2e3d71e303ce94eedfb24ab4acec79d58cebb4dec379b18d17915c64030dffd1bbcaa0d24568fa9af3fe2ca5c49b9386

  • SSDEEP

    49152:56lLXnSXQIYzUbB54moWOdv38hsy7JQ6AnxDGfF:56l2gDzU954QgEhDNQtnxqt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\g1wxxdmz.exe
    "C:\Users\Admin\AppData\Local\Temp\g1wxxdmz.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3432
    • C:\Users\Admin\AppData\Local\Temp\nswF293.tmp\RAVEndPointProtection-installer.exe
      "C:\Users\Admin\AppData\Local\Temp\nswF293.tmp\RAVEndPointProtection-installer.exe" "C:\Users\Admin\AppData\Local\Temp\g1wxxdmz.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3292

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nswF293.tmp\RAVEndPointProtection-installer.exe
    Filesize

    532KB

    MD5

    c003d9a41ea705f7ceadd009687bd73e

    SHA1

    c73247b97afa351b2e7d5913305ed90bdd6a4495

    SHA256

    49453f9d53dbc592b3eefa46e0dfd44e3ed06fb97c904c6af9e274dd63507d33

    SHA512

    e55fb7e3973d69f8a580e00213aa66dc1fcaec2fcb1c31a2a02dcae18b0b0f32120615bd1c8edd5fd2dc85dc4dc8886d1972aed6d063fecce83f1f2fa5b0052e

  • C:\Users\Admin\AppData\Local\Temp\nswF293.tmp\RAVEndPointProtection-installer.exe
    Filesize

    532KB

    MD5

    c003d9a41ea705f7ceadd009687bd73e

    SHA1

    c73247b97afa351b2e7d5913305ed90bdd6a4495

    SHA256

    49453f9d53dbc592b3eefa46e0dfd44e3ed06fb97c904c6af9e274dd63507d33

    SHA512

    e55fb7e3973d69f8a580e00213aa66dc1fcaec2fcb1c31a2a02dcae18b0b0f32120615bd1c8edd5fd2dc85dc4dc8886d1972aed6d063fecce83f1f2fa5b0052e

  • C:\Users\Admin\AppData\Local\Temp\nswF293.tmp\rsAtom.dll
    Filesize

    156KB

    MD5

    918d0cc3b06cc7eb209498668b445335

    SHA1

    b93eb4b05355932b32e825d9385edd156fa5044a

    SHA256

    eedc9e5cf0004233f04253bf3ff9550853f3843736847f87e0fd5247dd2f7e56

    SHA512

    00ceb3c5e756d16b6b44ae8e726c04587c6b7a97e48746c9bc6d542daee28dc0fd49066239208c91341c004836a8a1121c8b2b8397e79075bdc6a66260a44ee7

  • C:\Users\Admin\AppData\Local\Temp\nswF293.tmp\rsJSON.dll
    Filesize

    215KB

    MD5

    3110b4bb16cc0841f6a6fbe7bf8d763f

    SHA1

    6b9b348c897474941a6210031e3d34b3c091bde9

    SHA256

    d92c4525e454236f79961b2d31a648353faf96fc167b2198004a13fab4ce1168

    SHA512

    c59f596b20f6b59ac632e5c48094e61c5e7a4f8491e5302e5ce4755cc0d880a9fcb1859dccceaf3c1e8f2d3421b462817ce91b89bce404eee04477e28df456da

  • C:\Users\Admin\AppData\Local\Temp\nswF293.tmp\rsLogger.dll
    Filesize

    177KB

    MD5

    55fc8a6db9b869b96c6d1aea83cdc077

    SHA1

    62c08a1610d3f34361c8026085be53ca7ab86c29

    SHA256

    d0381b4d8da37f1d36bd80fb73b484e0f8335e03504ddeea2bd7302097c25ca1

    SHA512

    7faf52efbdbc0a489f05a508dfa82ffe137a2340c39383dff27859e84a34a0488de221c9cc6fcbd91098bb048d694c99dce846be64cf7971a56a90434d2b75bc

  • C:\Users\Admin\AppData\Local\Temp\nswF293.tmp\rsStubLib.dll
    Filesize

    221KB

    MD5

    06b11240e4500c2986a4733b191d6e98

    SHA1

    19b3a71835b7dd165ddbe2c1e47d2bc919e70e83

    SHA256

    691de46d75f87fc7b36ec8155c0cabcebe7bad6edc4849c42a3782315f4f1f82

    SHA512

    a65b81bba1ec9203da414f88df632831b7163de190cf07dd7af3efa229b7c18a48ef318165cd604c0f16b9a1ec9998171589298fa820522198197fb02f109280

  • memory/3292-197-0x00000254883F0000-0x00000254883F1000-memory.dmp
    Filesize

    4KB

  • memory/3292-200-0x00000254A48E0000-0x00000254A48F0000-memory.dmp
    Filesize

    64KB

  • memory/3292-193-0x00000254A4930000-0x00000254A4968000-memory.dmp
    Filesize

    224KB

  • memory/3292-189-0x0000025489B60000-0x0000025489B9A000-memory.dmp
    Filesize

    232KB

  • memory/3292-195-0x00000254A4970000-0x00000254A499A000-memory.dmp
    Filesize

    168KB

  • memory/3292-196-0x00000254A48E0000-0x00000254A48F0000-memory.dmp
    Filesize

    64KB

  • memory/3292-187-0x0000025487E70000-0x0000025487EF6000-memory.dmp
    Filesize

    536KB

  • memory/3292-198-0x00000254883D0000-0x00000254883D1000-memory.dmp
    Filesize

    4KB

  • memory/3292-199-0x00000254883E0000-0x00000254883E1000-memory.dmp
    Filesize

    4KB

  • memory/3292-191-0x00000254A38B0000-0x00000254A38E0000-memory.dmp
    Filesize

    192KB

  • memory/3292-201-0x00000254A51F0000-0x00000254A51F8000-memory.dmp
    Filesize

    32KB

  • memory/3292-202-0x00000254A8C70000-0x00000254A8CA8000-memory.dmp
    Filesize

    224KB

  • memory/3292-203-0x00000254A65C0000-0x00000254A65CE000-memory.dmp
    Filesize

    56KB

  • memory/3292-204-0x00000254A48E0000-0x00000254A48F0000-memory.dmp
    Filesize

    64KB

  • memory/3292-205-0x00000254A48E0000-0x00000254A48F0000-memory.dmp
    Filesize

    64KB

  • memory/3292-206-0x00000254A48E0000-0x00000254A48F0000-memory.dmp
    Filesize

    64KB

  • memory/3292-207-0x00000254A48E0000-0x00000254A48F0000-memory.dmp
    Filesize

    64KB

  • memory/3292-208-0x00000254A48E0000-0x00000254A48F0000-memory.dmp
    Filesize

    64KB

  • memory/3292-209-0x00000254A48E0000-0x00000254A48F0000-memory.dmp
    Filesize

    64KB