Analysis

  • max time kernel
    131s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2023, 16:16

General

  • Target

    91b7aea9c34e3e18301ae36000ad89f46952b58754bd76be4519f509d1420183.exe

  • Size

    16.2MB

  • MD5

    76c1dacebfb27e9c6078fe678fb65f92

  • SHA1

    5e565b031de74f17b35b1e5648c7a56a58de5d16

  • SHA256

    91b7aea9c34e3e18301ae36000ad89f46952b58754bd76be4519f509d1420183

  • SHA512

    4b31cf832e83a9518ff63b6c38368e610770803c5d7103bb2f8784628839297bda9b2ccd33b29e48efd7e9247673e840eec699b753393a6c6293970afd260564

  • SSDEEP

    393216:yRq1T/lOuJx1FHBb8Di6W3FPhG9G7M90w1:yRAlOurL18W6W3FPH7fw1

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91b7aea9c34e3e18301ae36000ad89f46952b58754bd76be4519f509d1420183.exe
    "C:\Users\Admin\AppData\Local\Temp\91b7aea9c34e3e18301ae36000ad89f46952b58754bd76be4519f509d1420183.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1992
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 03C08547F1DB18E97D91A0561C27A7C1 C
      2⤵
      • Loads dropped DLL
      PID:1928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\Local\Temp\AIE207D.tmp

    Filesize

    830KB

    MD5

    318c1b3ba46b0c8138cd4be3d66be0de

    SHA1

    7d829ab0c74f2b8ccc731821e8c268bd4a6b2cd8

    SHA256

    db6e5ccd6f59ae3033d719cc79b7be53408363a1d8b5dd55d78d7041a944d9df

    SHA512

    a4a473602690c0af6fb14c0e3425ff407b7d2e08ba5c3aa204304198e7a85dd15f618dfcd3bb9bdcfeba20a2b255bdea0926ea3eaeb9545380cd00097236116a

  • C:\Users\Admin\AppData\Local\Temp\AIE207D.tmp

    Filesize

    830KB

    MD5

    56438e33a740d76bdaa99a34623910ea

    SHA1

    40745f8bcb85abb77ca3dc1b6d3ec9e4d5428d3d

    SHA256

    733098d367a42f04c2499475f31753b789c64c20368737633c9aad540620bede

    SHA512

    733973e1a9ff7b473d70fce47a51f25c69b0ad1a798f127df89ab135780042c25c30545bd3e750b5f061fab3dca691334466217760eeae540ff33fd0cd1eedaf

  • C:\Users\Admin\AppData\Local\Temp\MSI3C42.tmp

    Filesize

    57KB

    MD5

    b3a3b86ab6e8e3f3cf782dd7c624fa10

    SHA1

    dfd86e147552ce2ad2289039edeab4a0ae09f96b

    SHA256

    60970d9e44051dbcc8fd863f8e82a2423ac7a65305ffde4c2c1d61d5e9c8bca9

    SHA512

    b6843667ab531ffe57cc13e55fab32606708210e24590a23f7efda16253d7a87f2a91f34de05c6a15a860fd1d9ec54f1392b231e34b0c62a7564f48b2ab89eaa

  • C:\Users\Admin\AppData\Local\Temp\MSI3EF1.tmp

    Filesize

    263KB

    MD5

    cd6bac60f4891fc56b61949cfac5186d

    SHA1

    4eb57e46160c1263c47c8630506451dba1dca191

    SHA256

    919a3c53883132bff760c954bdc48b930ddecb17fbdb5d4b71b193c5fe6a9b06

    SHA512

    f88096acda528b75de0ad2ff0a8445a4ea47ffd9c0b3f9eb5d7e1f0257ffbd5ea9dc5a75547e9eb1a6d951b5e625c750c0218f5fce47e67eba3cee7a45ee59fd

  • C:\Users\Admin\AppData\Local\Temp\MSI3F21.tmp

    Filesize

    57KB

    MD5

    b3a3b86ab6e8e3f3cf782dd7c624fa10

    SHA1

    dfd86e147552ce2ad2289039edeab4a0ae09f96b

    SHA256

    60970d9e44051dbcc8fd863f8e82a2423ac7a65305ffde4c2c1d61d5e9c8bca9

    SHA512

    b6843667ab531ffe57cc13e55fab32606708210e24590a23f7efda16253d7a87f2a91f34de05c6a15a860fd1d9ec54f1392b231e34b0c62a7564f48b2ab89eaa

  • C:\Users\Admin\AppData\Local\Temp\MSI3F21.tmp

    Filesize

    57KB

    MD5

    b3a3b86ab6e8e3f3cf782dd7c624fa10

    SHA1

    dfd86e147552ce2ad2289039edeab4a0ae09f96b

    SHA256

    60970d9e44051dbcc8fd863f8e82a2423ac7a65305ffde4c2c1d61d5e9c8bca9

    SHA512

    b6843667ab531ffe57cc13e55fab32606708210e24590a23f7efda16253d7a87f2a91f34de05c6a15a860fd1d9ec54f1392b231e34b0c62a7564f48b2ab89eaa

  • C:\Users\Admin\AppData\Local\Temp\Tar351D.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • \Users\Admin\AppData\Local\Temp\MSI3C42.tmp

    Filesize

    57KB

    MD5

    b3a3b86ab6e8e3f3cf782dd7c624fa10

    SHA1

    dfd86e147552ce2ad2289039edeab4a0ae09f96b

    SHA256

    60970d9e44051dbcc8fd863f8e82a2423ac7a65305ffde4c2c1d61d5e9c8bca9

    SHA512

    b6843667ab531ffe57cc13e55fab32606708210e24590a23f7efda16253d7a87f2a91f34de05c6a15a860fd1d9ec54f1392b231e34b0c62a7564f48b2ab89eaa

  • \Users\Admin\AppData\Local\Temp\MSI3EF1.tmp

    Filesize

    263KB

    MD5

    cd6bac60f4891fc56b61949cfac5186d

    SHA1

    4eb57e46160c1263c47c8630506451dba1dca191

    SHA256

    919a3c53883132bff760c954bdc48b930ddecb17fbdb5d4b71b193c5fe6a9b06

    SHA512

    f88096acda528b75de0ad2ff0a8445a4ea47ffd9c0b3f9eb5d7e1f0257ffbd5ea9dc5a75547e9eb1a6d951b5e625c750c0218f5fce47e67eba3cee7a45ee59fd

  • \Users\Admin\AppData\Local\Temp\MSI3F21.tmp

    Filesize

    57KB

    MD5

    b3a3b86ab6e8e3f3cf782dd7c624fa10

    SHA1

    dfd86e147552ce2ad2289039edeab4a0ae09f96b

    SHA256

    60970d9e44051dbcc8fd863f8e82a2423ac7a65305ffde4c2c1d61d5e9c8bca9

    SHA512

    b6843667ab531ffe57cc13e55fab32606708210e24590a23f7efda16253d7a87f2a91f34de05c6a15a860fd1d9ec54f1392b231e34b0c62a7564f48b2ab89eaa

  • \Users\Admin\AppData\Roaming\beyerdynamic\steno-s 4\install\1033.dll

    Filesize

    95KB

    MD5

    d97ab48736271e0123566a09ec16b0de

    SHA1

    7cb2a92400bd3499640eb27079ea64bafa5cc9ec

    SHA256

    8521baa5e14fcf64ea158cf5b0fe3ccb3cf448cb4eee7c993641be54447c030e

    SHA512

    da83f0523d79b8343dd0c96bb79a578a17ad5ab38ae5eb9d955dc9ed18ea28b6cf6d08a8f531693bf2c212c36ec8b52d1d52aac6da9080dc186c935fd2736180

  • memory/1992-57-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB

  • memory/1992-173-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB