Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-04-2021 17:48
Static task
static1
Behavioral task
behavioral1
Sample
uEhCwMFD.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
uEhCwMFD.exe
Resource
win10v20210408
General
-
Target
uEhCwMFD.exe
-
Size
29KB
-
MD5
4666a4144de0c73bfdc0408a74f9b851
-
SHA1
a56729b1ef81d5fa63e8653d3f128f7af8c006a3
-
SHA256
ecf161f5835d8bb37183dc34367260df19269ca98c80ff07f3a602ce673826e7
-
SHA512
660ea19a8e396a532ee49c8fcbab4c4f2dfab29601e2759ab19ace2c933723e515aa79f33da0e23d3c8ba494a441373f8133f27727075643de4084cc7069f62f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
lahana.exepid process 2012 lahana.exe -
Modifies Windows Firewall 1 TTPs
-
Loads dropped DLL 1 IoCs
Processes:
uEhCwMFD.exepid process 1100 uEhCwMFD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
lahana.exepid process 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe 2012 lahana.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
lahana.exedescription pid process Token: SeDebugPrivilege 2012 lahana.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
uEhCwMFD.exelahana.exedescription pid process target process PID 1100 wrote to memory of 2012 1100 uEhCwMFD.exe lahana.exe PID 1100 wrote to memory of 2012 1100 uEhCwMFD.exe lahana.exe PID 1100 wrote to memory of 2012 1100 uEhCwMFD.exe lahana.exe PID 1100 wrote to memory of 2012 1100 uEhCwMFD.exe lahana.exe PID 2012 wrote to memory of 1200 2012 lahana.exe netsh.exe PID 2012 wrote to memory of 1200 2012 lahana.exe netsh.exe PID 2012 wrote to memory of 1200 2012 lahana.exe netsh.exe PID 2012 wrote to memory of 1200 2012 lahana.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uEhCwMFD.exe"C:\Users\Admin\AppData\Local\Temp\uEhCwMFD.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\lahana.exe"C:\Users\Admin\AppData\Local\Temp\lahana.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\lahana.exe" "lahana.exe" ENABLE3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\lahana.exeMD5
4666a4144de0c73bfdc0408a74f9b851
SHA1a56729b1ef81d5fa63e8653d3f128f7af8c006a3
SHA256ecf161f5835d8bb37183dc34367260df19269ca98c80ff07f3a602ce673826e7
SHA512660ea19a8e396a532ee49c8fcbab4c4f2dfab29601e2759ab19ace2c933723e515aa79f33da0e23d3c8ba494a441373f8133f27727075643de4084cc7069f62f
-
C:\Users\Admin\AppData\Local\Temp\lahana.exeMD5
4666a4144de0c73bfdc0408a74f9b851
SHA1a56729b1ef81d5fa63e8653d3f128f7af8c006a3
SHA256ecf161f5835d8bb37183dc34367260df19269ca98c80ff07f3a602ce673826e7
SHA512660ea19a8e396a532ee49c8fcbab4c4f2dfab29601e2759ab19ace2c933723e515aa79f33da0e23d3c8ba494a441373f8133f27727075643de4084cc7069f62f
-
\Users\Admin\AppData\Local\Temp\lahana.exeMD5
4666a4144de0c73bfdc0408a74f9b851
SHA1a56729b1ef81d5fa63e8653d3f128f7af8c006a3
SHA256ecf161f5835d8bb37183dc34367260df19269ca98c80ff07f3a602ce673826e7
SHA512660ea19a8e396a532ee49c8fcbab4c4f2dfab29601e2759ab19ace2c933723e515aa79f33da0e23d3c8ba494a441373f8133f27727075643de4084cc7069f62f
-
memory/1100-59-0x0000000075A31000-0x0000000075A33000-memory.dmpFilesize
8KB
-
memory/1100-66-0x0000000000B80000-0x0000000000B81000-memory.dmpFilesize
4KB
-
memory/1200-65-0x0000000000000000-mapping.dmp
-
memory/2012-61-0x0000000000000000-mapping.dmp
-
memory/2012-67-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/2012-69-0x0000000000311000-0x0000000000312000-memory.dmpFilesize
4KB
-
memory/2012-70-0x0000000000316000-0x0000000000327000-memory.dmpFilesize
68KB