Analysis
-
max time kernel
587s -
max time network
595s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
12-04-2021 17:35
Static task
static1
Behavioral task
behavioral1
Sample
93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe
Resource
win7v20210410
0 signatures
0 seconds
General
-
Target
93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe
-
Size
204KB
-
MD5
27f49c4608311a736ef96673b2300531
-
SHA1
da24c13d479932796e992c1f42e979e637e476d0
-
SHA256
93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e
-
SHA512
8a698f8ac861e5545141e36faf35e91123cdb9ddaa2f7d8923ca4d80cf276325ccba900321b3b503473d2769c93a92ec6fa9bd2c2b3f2b3552202fdf25f7d30c
Score
10/10
Malware Config
Extracted
Family
plugx
C2
rainydaysweb.com:80
rainydaysweb.com:443
rainydaysweb.com:53
Mutex
dhHRYvLNaOVJXZdDsbdc
Attributes
-
folder
AAM UpdatesblF
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1988 web.exe 1612 AAM Updates.exe -
Loads dropped DLL 4 IoCs
pid Process 1432 rundll32.exe 1988 web.exe 1988 web.exe 1612 AAM Updates.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run web.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AAM UpdatesblF = "\"C:\\ProgramData\\AAM UpdatesblF\\AAM Updates.exe\" 429" web.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run web.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\AAM UpdatesblF = "\"C:\\ProgramData\\AAM UpdatesblF\\AAM Updates.exe\" 429" web.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu\PROXY AAM Updates.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ms-pu AAM Updates.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ms-pu\PROXY AAM Updates.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1612 AAM Updates.exe 1612 AAM Updates.exe 1612 AAM Updates.exe 1612 AAM Updates.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1612 AAM Updates.exe Token: SeDebugPrivilege 1612 AAM Updates.exe Token: SeTcbPrivilege 1612 AAM Updates.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1864 wrote to memory of 1432 1864 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1864 wrote to memory of 1432 1864 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1864 wrote to memory of 1432 1864 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1864 wrote to memory of 1432 1864 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1864 wrote to memory of 1432 1864 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1864 wrote to memory of 1432 1864 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1864 wrote to memory of 1432 1864 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1432 wrote to memory of 1988 1432 rundll32.exe 27 PID 1432 wrote to memory of 1988 1432 rundll32.exe 27 PID 1432 wrote to memory of 1988 1432 rundll32.exe 27 PID 1432 wrote to memory of 1988 1432 rundll32.exe 27 PID 1988 wrote to memory of 1612 1988 web.exe 29 PID 1988 wrote to memory of 1612 1988 web.exe 29 PID 1988 wrote to memory of 1612 1988 web.exe 29 PID 1988 wrote to memory of 1612 1988 web.exe 29 PID 1988 wrote to memory of 1612 1988 web.exe 29 PID 1988 wrote to memory of 1612 1988 web.exe 29 PID 1988 wrote to memory of 1612 1988 web.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe"C:\Users\Admin\AppData\Local\Temp\93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\web.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\web.exe"C:\Users\Admin\AppData\Local\Temp\web.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\ProgramData\AAM UpdatesblF\AAM Updates.exe"C:\ProgramData\AAM UpdatesblF\AAM Updates.exe" 4294⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
-