Analysis

  • max time kernel
    151s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 09:37

General

  • Target

    ransomware.exe

  • Size

    434KB

  • MD5

    63bab74409c514ed8548b1f33d0acedc

  • SHA1

    abc6bb8dd01fa83d7fd92182601b868d2b6dd1ea

  • SHA256

    265041a4e943debd8b6b147085cb8549be110facde2288021e90ae65e87be235

  • SHA512

    27a28305e604b25fe7c71a8f7db4a453e6cca234c27f1c747cdaa98060c5a7f7788e983b5ec9d550ca62a0895b21b4c1403d3b3f595d7d7693e7f422855af4f1

  • SSDEEP

    12288:s6Wq4aaE6KwyF5L0Y2D1PqLVSV7uikFgd9OFNu:qthEVaPqLIlubgdYu

Score
7/10

Malware Config

Signatures

  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 16 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\ransomware.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:4424

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\aut6662.tmp

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Local\Temp\index.html

    Filesize

    536B

    MD5

    d8054b190eeae6c777bb693dc14ce497

    SHA1

    1b7aa7a0b6d0126ed4e2771a89ffbcb0f1e50205

    SHA256

    69392b73c989af987838d132fbe17bfe6b124917074200897197c21f6ff51716

    SHA512

    351ad20ece4d3155fb7045a3a20de33276d76f934c88d538f86aa5e7f419a2bd1253f870e5a9e07a46c4657149dade9b93fc94c3e0d04ca565082c2ad18ded39

  • memory/4424-164-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-165-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-160-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-161-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-162-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-163-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-150-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-159-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-166-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-167-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-168-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-169-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-170-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-171-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-172-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/4424-173-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB