Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
28-02-2021 07:08
Static task
static1
Behavioral task
behavioral1
Sample
4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe
Resource
win10v20201028
General
-
Target
4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe
-
Size
78KB
-
MD5
0106ede4fe7c8704ea04b3f66c5d80d6
-
SHA1
59d774bed7c7c8f76de7fa436e238413870d16b6
-
SHA256
4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d
-
SHA512
8ed68cc9a26eb9ce1f9fd0d70ae0d0a6ba91c3d3cc3a2feb730957556f981edbcf41841815220552aedffcf85b1d967442e9d7fe9fd8f5a20ef19d1f7340439e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1784 tmp1C5.tmp.exe -
Deletes itself 1 IoCs
pid Process 1784 tmp1C5.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 1576 4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe 1576 4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShFusRes = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\big5.exe\"" tmp1C5.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1576 4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe Token: SeDebugPrivilege 1784 tmp1C5.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1576 wrote to memory of 1964 1576 4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe 26 PID 1576 wrote to memory of 1964 1576 4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe 26 PID 1576 wrote to memory of 1964 1576 4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe 26 PID 1576 wrote to memory of 1964 1576 4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe 26 PID 1964 wrote to memory of 1936 1964 vbc.exe 28 PID 1964 wrote to memory of 1936 1964 vbc.exe 28 PID 1964 wrote to memory of 1936 1964 vbc.exe 28 PID 1964 wrote to memory of 1936 1964 vbc.exe 28 PID 1576 wrote to memory of 1784 1576 4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe 29 PID 1576 wrote to memory of 1784 1576 4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe 29 PID 1576 wrote to memory of 1784 1576 4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe 29 PID 1576 wrote to memory of 1784 1576 4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe"C:\Users\Admin\AppData\Local\Temp\4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\pnwhro_y.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES31D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc31C.tmp"3⤵PID:1936
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp1C5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1C5.tmp.exe" C:\Users\Admin\AppData\Local\Temp\4d7e3818fcaa4b55056d58e20420d10fe1d8e56fbd6059d0a716c877f73aaa5d.exe2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1784
-