Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-04-2021 17:33
Static task
static1
Behavioral task
behavioral1
Sample
kFZL7Q3b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
kFZL7Q3b.exe
Resource
win10v20210408
General
-
Target
kFZL7Q3b.exe
-
Size
29KB
-
MD5
05a677cf02b11ca26d30e538dc56001f
-
SHA1
b82536b603be4f7a9a0231db925129c9efbc777b
-
SHA256
a121587e76f7ab2c542262abbb0904500e9924a44fd2fa89cc9406f9e385ac3e
-
SHA512
408d5697ffe5c567d06faf28a0f85419696dc2e23eb528f92464192c234cadb5c3fcd867c8107defe3f5da90e0eee76634b175ce2c1f6b54e5a43cc62017826f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
lahana.exepid process 3488 lahana.exe -
Modifies Windows Firewall 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
lahana.exepid process 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe 3488 lahana.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
lahana.exedescription pid process Token: SeDebugPrivilege 3488 lahana.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
kFZL7Q3b.exelahana.exedescription pid process target process PID 640 wrote to memory of 3488 640 kFZL7Q3b.exe lahana.exe PID 640 wrote to memory of 3488 640 kFZL7Q3b.exe lahana.exe PID 640 wrote to memory of 3488 640 kFZL7Q3b.exe lahana.exe PID 3488 wrote to memory of 3300 3488 lahana.exe netsh.exe PID 3488 wrote to memory of 3300 3488 lahana.exe netsh.exe PID 3488 wrote to memory of 3300 3488 lahana.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\kFZL7Q3b.exe"C:\Users\Admin\AppData\Local\Temp\kFZL7Q3b.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\lahana.exe"C:\Users\Admin\AppData\Local\Temp\lahana.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\lahana.exe" "lahana.exe" ENABLE3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\lahana.exeMD5
05a677cf02b11ca26d30e538dc56001f
SHA1b82536b603be4f7a9a0231db925129c9efbc777b
SHA256a121587e76f7ab2c542262abbb0904500e9924a44fd2fa89cc9406f9e385ac3e
SHA512408d5697ffe5c567d06faf28a0f85419696dc2e23eb528f92464192c234cadb5c3fcd867c8107defe3f5da90e0eee76634b175ce2c1f6b54e5a43cc62017826f
-
C:\Users\Admin\AppData\Local\Temp\lahana.exeMD5
05a677cf02b11ca26d30e538dc56001f
SHA1b82536b603be4f7a9a0231db925129c9efbc777b
SHA256a121587e76f7ab2c542262abbb0904500e9924a44fd2fa89cc9406f9e385ac3e
SHA512408d5697ffe5c567d06faf28a0f85419696dc2e23eb528f92464192c234cadb5c3fcd867c8107defe3f5da90e0eee76634b175ce2c1f6b54e5a43cc62017826f
-
memory/640-114-0x0000000000930000-0x0000000000931000-memory.dmpFilesize
4KB
-
memory/3300-118-0x0000000000000000-mapping.dmp
-
memory/3488-115-0x0000000000000000-mapping.dmp
-
memory/3488-119-0x0000000002BD0000-0x0000000002BD1000-memory.dmpFilesize
4KB
-
memory/3488-120-0x0000000002BD1000-0x0000000002BD2000-memory.dmpFilesize
4KB
-
memory/3488-121-0x0000000002BD4000-0x0000000002BD6000-memory.dmpFilesize
8KB