Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    23/03/2023, 09:38

General

  • Target

    ca6a4db4964f4475bed525178ad92f0c.exe

  • Size

    64KB

  • MD5

    ca6a4db4964f4475bed525178ad92f0c

  • SHA1

    66eb56d69006dd3df2ae8aef566bd8a7f70a0cb1

  • SHA256

    3efee23e062979685c1efb87ef9c739630c4da1e7a7ad22e8c45da66ad0f4b3c

  • SHA512

    31d0d2fb98accc0a6ef9e68cf7508c133653272e0e053f0116cfcdcac190f1d3732a4d7daaefed92abba090268b40fa56c5dd9d446870eea513658071bd54876

  • SSDEEP

    1536:ih3HaMmkefuYjsDAiENQVseNbIB2Cdoo:i3GNjsD8YNOtCo

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca6a4db4964f4475bed525178ad92f0c.exe
    "C:\Users\Admin\AppData\Local\Temp\ca6a4db4964f4475bed525178ad92f0c.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\ca6a4db4964f4475bed525178ad92f0c.exe

    Filesize

    64KB

    MD5

    ca6a4db4964f4475bed525178ad92f0c

    SHA1

    66eb56d69006dd3df2ae8aef566bd8a7f70a0cb1

    SHA256

    3efee23e062979685c1efb87ef9c739630c4da1e7a7ad22e8c45da66ad0f4b3c

    SHA512

    31d0d2fb98accc0a6ef9e68cf7508c133653272e0e053f0116cfcdcac190f1d3732a4d7daaefed92abba090268b40fa56c5dd9d446870eea513658071bd54876

  • memory/2008-54-0x0000000000F80000-0x0000000000F96000-memory.dmp

    Filesize

    88KB

  • memory/2008-55-0x0000000000370000-0x0000000000382000-memory.dmp

    Filesize

    72KB

  • memory/2008-56-0x00000000003A0000-0x00000000003BA000-memory.dmp

    Filesize

    104KB

  • memory/2008-63-0x0000000000D50000-0x0000000000D90000-memory.dmp

    Filesize

    256KB