Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7 -
submitted
25-10-2020 20:35
Static task
static1
Behavioral task
behavioral1
Sample
12a4c7c6742cbd46487d9960b79a7e65.exe
Resource
win7
General
-
Target
12a4c7c6742cbd46487d9960b79a7e65.exe
-
Size
908KB
-
MD5
12a4c7c6742cbd46487d9960b79a7e65
-
SHA1
8175c5eb646937158646dbe603a7e8bfbc50110f
-
SHA256
f90072375238d4883d4116dc9900751ac431ad8322e0fd58323a82ec5d69cbe4
-
SHA512
c6b364c467f9d5e470debb6c40e2426dd410ca7da3fdd68ab3da0f1e0c2e080876ee6006a90371965be27897b7ecd304da42b69e13fa9cc4a9035fb35ceac3f9
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Decoder.exesystems32.exepid process 1992 Decoder.exe 246860 systems32.exe -
Drops startup file 2 IoCs
Processes:
Decoder.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows driver update.exe Decoder.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows driver update.exe Decoder.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 320 schtasks.exe 247124 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 1728 timeout.exe 672 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Decoder.exesystems32.exepid process 1992 Decoder.exe 246860 systems32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
12a4c7c6742cbd46487d9960b79a7e65.exeDecoder.exesystems32.exedescription pid process Token: SeDebugPrivilege 1160 12a4c7c6742cbd46487d9960b79a7e65.exe Token: SeDebugPrivilege 1992 Decoder.exe Token: SeDebugPrivilege 246860 systems32.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
12a4c7c6742cbd46487d9960b79a7e65.execmd.execmd.exeDecoder.exetaskeng.exesystems32.exedescription pid process target process PID 1160 wrote to memory of 1992 1160 12a4c7c6742cbd46487d9960b79a7e65.exe Decoder.exe PID 1160 wrote to memory of 1992 1160 12a4c7c6742cbd46487d9960b79a7e65.exe Decoder.exe PID 1160 wrote to memory of 1992 1160 12a4c7c6742cbd46487d9960b79a7e65.exe Decoder.exe PID 1160 wrote to memory of 1980 1160 12a4c7c6742cbd46487d9960b79a7e65.exe cmd.exe PID 1160 wrote to memory of 1980 1160 12a4c7c6742cbd46487d9960b79a7e65.exe cmd.exe PID 1160 wrote to memory of 1980 1160 12a4c7c6742cbd46487d9960b79a7e65.exe cmd.exe PID 1160 wrote to memory of 1968 1160 12a4c7c6742cbd46487d9960b79a7e65.exe cmd.exe PID 1160 wrote to memory of 1968 1160 12a4c7c6742cbd46487d9960b79a7e65.exe cmd.exe PID 1160 wrote to memory of 1968 1160 12a4c7c6742cbd46487d9960b79a7e65.exe cmd.exe PID 1980 wrote to memory of 1728 1980 cmd.exe timeout.exe PID 1980 wrote to memory of 1728 1980 cmd.exe timeout.exe PID 1980 wrote to memory of 1728 1980 cmd.exe timeout.exe PID 1968 wrote to memory of 672 1968 cmd.exe timeout.exe PID 1968 wrote to memory of 672 1968 cmd.exe timeout.exe PID 1968 wrote to memory of 672 1968 cmd.exe timeout.exe PID 1992 wrote to memory of 320 1992 Decoder.exe schtasks.exe PID 1992 wrote to memory of 320 1992 Decoder.exe schtasks.exe PID 1992 wrote to memory of 320 1992 Decoder.exe schtasks.exe PID 246344 wrote to memory of 246860 246344 taskeng.exe systems32.exe PID 246344 wrote to memory of 246860 246344 taskeng.exe systems32.exe PID 246344 wrote to memory of 246860 246344 taskeng.exe systems32.exe PID 246860 wrote to memory of 247124 246860 systems32.exe schtasks.exe PID 246860 wrote to memory of 247124 246860 systems32.exe schtasks.exe PID 246860 wrote to memory of 247124 246860 systems32.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a4c7c6742cbd46487d9960b79a7e65.exe"C:\Users\Admin\AppData\Local\Temp\12a4c7c6742cbd46487d9960b79a7e65.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Decoder.exe"C:\ProgramData\Decoder.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "Windows Services" /tr "\systems32_bit\systems32.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\.cmd""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp13BC.tmp.cmd""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\taskeng.exetaskeng.exe {4CB5AAC4-534C-4006-A50A-60E750C43C51} S-1-5-21-4210623931-3856158591-1213714290-1000:VDIPBIOF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\systems32_bit\systems32.exe\systems32_bit\systems32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "Windows Services" /tr "\systems32_bit\systems32.exe" /f3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Decoder.exeMD5
e753a9a4c3a393d9eccc31e5c6aded66
SHA15501ae71598925711dbee54f6ee1c827dd01d845
SHA25652773fccbe6883ca7465ffe857c3fe7193521f0807bd8462f95bd4ad73be9867
SHA512ee03d79cd24db07c3466cc602a657c9eb33119267b591a64a0d9215e3a80a24e3c435275ccfb5ffd7356def5bf717c5f2d8bc9a5b2daf1950ecf951b5e614c2e
-
C:\ProgramData\Decoder.exeMD5
e753a9a4c3a393d9eccc31e5c6aded66
SHA15501ae71598925711dbee54f6ee1c827dd01d845
SHA25652773fccbe6883ca7465ffe857c3fe7193521f0807bd8462f95bd4ad73be9867
SHA512ee03d79cd24db07c3466cc602a657c9eb33119267b591a64a0d9215e3a80a24e3c435275ccfb5ffd7356def5bf717c5f2d8bc9a5b2daf1950ecf951b5e614c2e
-
C:\Users\Admin\AppData\Local\Temp\.cmdMD5
217407484aac2673214337def8886072
SHA10f8c4c94064ce1f7538c43987feb5bb2d7fec0c6
SHA256467c28ed423f513128575b1c8c6674ee5671096ff1b14bc4c32deebd89fc1797
SHA5128466383a1cb71ea8b049548fd5a41aaf01c0423743b886cd3cb5007f66bff87d8d5cfa67344451f4490c8f26e4ebf9e306075d5cfc655dc62f0813a456cf1330
-
C:\Users\Admin\AppData\Local\Temp\tmp13BC.tmp.cmdMD5
d28c2247a491e29cf663b0cc2c203e15
SHA136c00d0e35fe45c1c18a763bd0e57fe3a559079f
SHA25669e3147ba5f7c27d60d80fcbb57f22ab18e60416892aa515a0b85f86f0d742f6
SHA512f325fd3bf3cf495302192e1e1f29355df551d36e7a487db8cf1727ab561c5f2718de5ade44e83785f3463a73f42a4cb27b2981bae3fa5a9807b6bbd312966bb0
-
C:\systems32_bit\systems32.exeMD5
e753a9a4c3a393d9eccc31e5c6aded66
SHA15501ae71598925711dbee54f6ee1c827dd01d845
SHA25652773fccbe6883ca7465ffe857c3fe7193521f0807bd8462f95bd4ad73be9867
SHA512ee03d79cd24db07c3466cc602a657c9eb33119267b591a64a0d9215e3a80a24e3c435275ccfb5ffd7356def5bf717c5f2d8bc9a5b2daf1950ecf951b5e614c2e
-
C:\systems32_bit\systems32.exeMD5
e753a9a4c3a393d9eccc31e5c6aded66
SHA15501ae71598925711dbee54f6ee1c827dd01d845
SHA25652773fccbe6883ca7465ffe857c3fe7193521f0807bd8462f95bd4ad73be9867
SHA512ee03d79cd24db07c3466cc602a657c9eb33119267b591a64a0d9215e3a80a24e3c435275ccfb5ffd7356def5bf717c5f2d8bc9a5b2daf1950ecf951b5e614c2e
-
memory/320-16-0x0000000000000000-mapping.dmp
-
memory/672-15-0x0000000000000000-mapping.dmp
-
memory/1160-3-0x0000000000B40000-0x0000000000BB0000-memory.dmpFilesize
448KB
-
memory/1160-1-0x0000000000E70000-0x0000000000E71000-memory.dmpFilesize
4KB
-
memory/1160-0-0x000007FEF5EC0000-0x000007FEF68AC000-memory.dmpFilesize
9.9MB
-
memory/1728-13-0x0000000000000000-mapping.dmp
-
memory/1968-8-0x0000000000000000-mapping.dmp
-
memory/1980-6-0x0000000000000000-mapping.dmp
-
memory/1992-10-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/1992-9-0x000007FEF5EC0000-0x000007FEF68AC000-memory.dmpFilesize
9.9MB
-
memory/1992-4-0x0000000000000000-mapping.dmp
-
memory/246860-17-0x0000000000000000-mapping.dmp
-
memory/246860-20-0x000007FEF5EC0000-0x000007FEF68AC000-memory.dmpFilesize
9.9MB
-
memory/246860-21-0x0000000000900000-0x0000000000901000-memory.dmpFilesize
4KB
-
memory/247124-23-0x0000000000000000-mapping.dmp