Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/03/2023, 09:38

General

  • Target

    ca6a4db4964f4475bed525178ad92f0c.exe

  • Size

    64KB

  • MD5

    ca6a4db4964f4475bed525178ad92f0c

  • SHA1

    66eb56d69006dd3df2ae8aef566bd8a7f70a0cb1

  • SHA256

    3efee23e062979685c1efb87ef9c739630c4da1e7a7ad22e8c45da66ad0f4b3c

  • SHA512

    31d0d2fb98accc0a6ef9e68cf7508c133653272e0e053f0116cfcdcac190f1d3732a4d7daaefed92abba090268b40fa56c5dd9d446870eea513658071bd54876

  • SSDEEP

    1536:ih3HaMmkefuYjsDAiENQVseNbIB2Cdoo:i3GNjsD8YNOtCo

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca6a4db4964f4475bed525178ad92f0c.exe
    "C:\Users\Admin\AppData\Local\Temp\ca6a4db4964f4475bed525178ad92f0c.exe"
    1⤵
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4104-133-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/4104-134-0x0000000005A90000-0x0000000006034000-memory.dmp

    Filesize

    5.6MB

  • memory/4104-137-0x00000000054D0000-0x00000000054E0000-memory.dmp

    Filesize

    64KB

  • memory/4104-138-0x0000000005660000-0x00000000056D6000-memory.dmp

    Filesize

    472KB

  • memory/4104-139-0x00000000062F0000-0x000000000630E000-memory.dmp

    Filesize

    120KB

  • memory/4104-143-0x00000000069D0000-0x0000000006A62000-memory.dmp

    Filesize

    584KB

  • memory/4104-144-0x00000000069A0000-0x00000000069AA000-memory.dmp

    Filesize

    40KB

  • memory/4104-145-0x00000000054D0000-0x00000000054E0000-memory.dmp

    Filesize

    64KB