Analysis

  • max time kernel
    144s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    31-03-2023 02:10

General

  • Target

    1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe

  • Size

    2.6MB

  • MD5

    e0a64ea350aed7cc5e867677944b03e3

  • SHA1

    e0f62ed674ba6c79b215d82babc733f05623ab24

  • SHA256

    1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef

  • SHA512

    921c94526b0b30fa32d46d11474133cbbb69e2c816b26e54a7002649ad100787b83e33d7369119c4feb1462d8a8db58889355a030a2ba4fe0f1ca904472e1ccb

  • SSDEEP

    24576:q5vWSTfOvF//1SbrNnT/feTtJ2h8IYb2ny/v/LtGZsYjot0VHeaw5qGabocdcyoQ:q5vWSw0bUTWHMqT3dYMfY/HDr/G

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe
    "C:\Users\Admin\AppData\Local\Temp\1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1968
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3; Set-MpPreference -ExclusionPath C:\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:652

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
    Filesize

    7KB

    MD5

    718e9d8f7dbfe4c662219f2dd00cdd38

    SHA1

    84605738aec044cf0c3b7879d25dab35b97ac135

    SHA256

    a3dc5523ead991fa63685ac56a60afdc8d387f623d6d966b909a02501eb0c1ca

    SHA512

    86fc4118418d37776530f97d3c8e04bb7dd57ccf0b3632241c510c6ae7ec5ceacd63c4504a8eb6ae07d7cb095b54fbd23a588f55bf553bb4dcc387c497343137

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7PXGK1Y83T9MFRTFOIHP.temp
    Filesize

    7KB

    MD5

    718e9d8f7dbfe4c662219f2dd00cdd38

    SHA1

    84605738aec044cf0c3b7879d25dab35b97ac135

    SHA256

    a3dc5523ead991fa63685ac56a60afdc8d387f623d6d966b909a02501eb0c1ca

    SHA512

    86fc4118418d37776530f97d3c8e04bb7dd57ccf0b3632241c510c6ae7ec5ceacd63c4504a8eb6ae07d7cb095b54fbd23a588f55bf553bb4dcc387c497343137

  • memory/652-2285-0x00000000029D0000-0x0000000002A50000-memory.dmp
    Filesize

    512KB

  • memory/652-2284-0x00000000029D0000-0x0000000002A50000-memory.dmp
    Filesize

    512KB

  • memory/652-2283-0x00000000029D0000-0x0000000002A50000-memory.dmp
    Filesize

    512KB

  • memory/652-2282-0x0000000001F50000-0x0000000001F58000-memory.dmp
    Filesize

    32KB

  • memory/652-2281-0x000000001B390000-0x000000001B672000-memory.dmp
    Filesize

    2.9MB

  • memory/1620-118-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-110-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-2292-0x000000001B660000-0x000000001B676000-memory.dmp
    Filesize

    88KB

  • memory/1620-2291-0x000000001B180000-0x000000001B200000-memory.dmp
    Filesize

    512KB

  • memory/1620-2290-0x000000001B180000-0x000000001B200000-memory.dmp
    Filesize

    512KB

  • memory/1620-124-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-76-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-78-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-80-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-82-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-84-0x0000000000640000-0x0000000000641000-memory.dmp
    Filesize

    4KB

  • memory/1620-85-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-86-0x000000001BD30000-0x000000001BDDC000-memory.dmp
    Filesize

    688KB

  • memory/1620-126-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-89-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-90-0x000000001B180000-0x000000001B200000-memory.dmp
    Filesize

    512KB

  • memory/1620-92-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-94-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-96-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-98-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-100-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-102-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-104-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-106-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-108-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-128-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-112-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-114-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-116-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-54-0x00000000000A0000-0x0000000000348000-memory.dmp
    Filesize

    2.7MB

  • memory/1620-120-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-122-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-2289-0x000000001B180000-0x000000001B200000-memory.dmp
    Filesize

    512KB

  • memory/1620-88-0x000000001B180000-0x000000001B200000-memory.dmp
    Filesize

    512KB

  • memory/1620-74-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-130-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-132-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-134-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-136-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-138-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-140-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-2269-0x000000001B300000-0x000000001B356000-memory.dmp
    Filesize

    344KB

  • memory/1620-2270-0x000000001B180000-0x000000001B200000-memory.dmp
    Filesize

    512KB

  • memory/1620-2272-0x000000001B180000-0x000000001B200000-memory.dmp
    Filesize

    512KB

  • memory/1620-2271-0x000000001B180000-0x000000001B200000-memory.dmp
    Filesize

    512KB

  • memory/1620-2273-0x000000001B3F0000-0x000000001B43C000-memory.dmp
    Filesize

    304KB

  • memory/1620-2274-0x000000001B440000-0x000000001B494000-memory.dmp
    Filesize

    336KB

  • memory/1620-73-0x000000001CCE0000-0x000000001CDB8000-memory.dmp
    Filesize

    864KB

  • memory/1620-72-0x000000001CCE0000-0x000000001CDBC000-memory.dmp
    Filesize

    880KB

  • memory/1620-71-0x000000001BF40000-0x000000001BFE6000-memory.dmp
    Filesize

    664KB

  • memory/1620-68-0x000000001B180000-0x000000001B200000-memory.dmp
    Filesize

    512KB

  • memory/1620-57-0x000000001B270000-0x000000001B302000-memory.dmp
    Filesize

    584KB

  • memory/1620-56-0x000000001B8F0000-0x000000001BAE0000-memory.dmp
    Filesize

    1.9MB

  • memory/1620-55-0x000000001B180000-0x000000001B200000-memory.dmp
    Filesize

    512KB

  • memory/1620-2286-0x000000001B180000-0x000000001B200000-memory.dmp
    Filesize

    512KB

  • memory/1620-2287-0x000000001B180000-0x000000001B200000-memory.dmp
    Filesize

    512KB

  • memory/1620-2288-0x000000001B180000-0x000000001B200000-memory.dmp
    Filesize

    512KB

  • memory/1968-65-0x0000000002420000-0x0000000002428000-memory.dmp
    Filesize

    32KB

  • memory/1968-64-0x000000001B1D0000-0x000000001B4B2000-memory.dmp
    Filesize

    2.9MB

  • memory/1968-63-0x0000000002570000-0x00000000025F0000-memory.dmp
    Filesize

    512KB

  • memory/1968-62-0x0000000002570000-0x00000000025F0000-memory.dmp
    Filesize

    512KB

  • memory/1968-66-0x0000000002570000-0x00000000025F0000-memory.dmp
    Filesize

    512KB

  • memory/1968-67-0x0000000002570000-0x00000000025F0000-memory.dmp
    Filesize

    512KB

  • memory/1968-70-0x0000000002570000-0x00000000025F0000-memory.dmp
    Filesize

    512KB

  • memory/1968-69-0x0000000002570000-0x00000000025F0000-memory.dmp
    Filesize

    512KB