Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
28-02-2021 07:18
Static task
static1
Behavioral task
behavioral1
Sample
71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe
Resource
win10v20201028
General
-
Target
71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe
-
Size
627KB
-
MD5
70b5ca289fa630db5715f047212a5403
-
SHA1
e6e4d63c0be8cbad0517c4ae1a56b1beefac5980
-
SHA256
71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166
-
SHA512
e347f690dd54bb48e63a12ba8c63fd7617eafa9b03aea73a4ab107cca3838723bf38a0d3ed36a2e43d3ae6876f26ffd3f27230220fab430f389c90bb2a0aff84
Malware Config
Signatures
-
DarkTrack Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Sys32.exe family_darktrack C:\Users\Admin\AppData\Roaming\Sys32.exe family_darktrack -
Executes dropped EXE 1 IoCs
Processes:
Sys32.exepid process 3608 Sys32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
notepad.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Sys32.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Sys32.exe" notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Sys32.exepid process 3608 Sys32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exeSys32.exedescription pid process target process PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 4128 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe notepad.exe PID 4724 wrote to memory of 3608 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe Sys32.exe PID 4724 wrote to memory of 3608 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe Sys32.exe PID 4724 wrote to memory of 3608 4724 71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe Sys32.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 4216 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe PID 3608 wrote to memory of 2776 3608 Sys32.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe"C:\Users\Admin\AppData\Local\Temp\71d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\notepad.exenotepad2⤵PID:4128
-
-
C:\Users\Admin\AppData\Roaming\Sys32.exe"C:\Users\Admin\AppData\Roaming\Sys32.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:4216
-
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- Adds Run key to start application
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
70b5ca289fa630db5715f047212a5403
SHA1e6e4d63c0be8cbad0517c4ae1a56b1beefac5980
SHA25671d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166
SHA512e347f690dd54bb48e63a12ba8c63fd7617eafa9b03aea73a4ab107cca3838723bf38a0d3ed36a2e43d3ae6876f26ffd3f27230220fab430f389c90bb2a0aff84
-
MD5
70b5ca289fa630db5715f047212a5403
SHA1e6e4d63c0be8cbad0517c4ae1a56b1beefac5980
SHA25671d441f9725ee7a1e158a85e037e2311875f19ad12729900dba14c3ded8c5166
SHA512e347f690dd54bb48e63a12ba8c63fd7617eafa9b03aea73a4ab107cca3838723bf38a0d3ed36a2e43d3ae6876f26ffd3f27230220fab430f389c90bb2a0aff84