Analysis

  • max time kernel
    103s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2023 09:56

General

  • Target

    e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe

  • Size

    1.8MB

  • MD5

    048f86a3bf0f6b65184c677e0a1d1ed1

  • SHA1

    7b8d29706d9e6a2ead55478d0e532e3a641d76ce

  • SHA256

    e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594

  • SHA512

    0bebc9a6f3b39a99638bf262921a362a79ab541712aa1d1b954f14f7d38d82df2a8999216fef52dbace9b432a518dc5ce916aac8099a5c12ab86a1d0de2f891b

  • SSDEEP

    24576:5642Vz9WVF/eOroWm9V4spl6SiYxyo6jjHwxMH5F3FqYUzLx6jR2u:QzQVpeO0pwSiY164kFnUzLx6jR2

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe
    "C:\Users\Admin\AppData\Local\Temp\e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3992

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Abosskey\newconfig.ini

    Filesize

    179B

    MD5

    f6c314a9fba4693d24ef384cea7dc671

    SHA1

    9f813d98b6339d31087f393bf05d003457846f1e

    SHA256

    fcf90df47e0d57958569e714f3c38090f6739df12ee6a5c1e95c8d0d81b56870

    SHA512

    75510d1904347129033a13b071d5bc64b9d2c0950c996d609e05b0f5413f7fd760312ffe7ffebf9318ab7d473224a8ad37230fa0bb1a48a7e4161cf5ae18b1b3

  • memory/3992-133-0x0000000010000000-0x000000001019C000-memory.dmp

    Filesize

    1.6MB

  • memory/3992-148-0x0000000002F00000-0x00000000030E5000-memory.dmp

    Filesize

    1.9MB

  • memory/3992-150-0x0000000002F00000-0x00000000030E5000-memory.dmp

    Filesize

    1.9MB

  • memory/3992-151-0x0000000002F00000-0x00000000030E5000-memory.dmp

    Filesize

    1.9MB

  • memory/3992-152-0x0000000002F00000-0x00000000030E5000-memory.dmp

    Filesize

    1.9MB

  • memory/3992-153-0x0000000003300000-0x0000000003301000-memory.dmp

    Filesize

    4KB

  • memory/3992-154-0x00000000032E0000-0x00000000032E1000-memory.dmp

    Filesize

    4KB

  • memory/3992-155-0x00000000032D0000-0x00000000032D1000-memory.dmp

    Filesize

    4KB

  • memory/3992-156-0x0000000002F00000-0x00000000030E5000-memory.dmp

    Filesize

    1.9MB

  • memory/3992-159-0x0000000002F00000-0x00000000030E5000-memory.dmp

    Filesize

    1.9MB

  • memory/3992-162-0x0000000002F00000-0x00000000030E5000-memory.dmp

    Filesize

    1.9MB