Analysis
-
max time kernel
150s -
max time network
175s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
26-05-2021 07:58
Static task
static1
Behavioral task
behavioral1
Sample
49545f0af79ded22054bfd851bb3d864.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
49545f0af79ded22054bfd851bb3d864.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
49545f0af79ded22054bfd851bb3d864.exe
-
Size
87KB
-
MD5
49545f0af79ded22054bfd851bb3d864
-
SHA1
35db307d4e2d287e005262a5d5edd56b73bfc415
-
SHA256
004cae62d64d4fd40532660626ef95b5c5a899de64e060f9e6223974219ef080
-
SHA512
96a3366ba95c669d81803ab8157364df0e7dc2ef6f6e0f80775e0a8d21c79ab12c162de4a444ce13cba4d76bce6dd05b1356f2ad13a613e015a9e60b01f6956a
Score
10/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 856 explorer.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fbcbedd4b56a64913eb91b5733046b75.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fbcbedd4b56a64913eb91b5733046b75.exe explorer.exe -
Loads dropped DLL 1 IoCs
pid Process 1892 49545f0af79ded22054bfd851bb3d864.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\fbcbedd4b56a64913eb91b5733046b75 = "\"C:\\ProgramData\\explorer.exe\" .." explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\fbcbedd4b56a64913eb91b5733046b75 = "\"C:\\ProgramData\\explorer.exe\" .." explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe Token: 33 856 explorer.exe Token: SeIncBasePriorityPrivilege 856 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1892 wrote to memory of 856 1892 49545f0af79ded22054bfd851bb3d864.exe 29 PID 1892 wrote to memory of 856 1892 49545f0af79ded22054bfd851bb3d864.exe 29 PID 1892 wrote to memory of 856 1892 49545f0af79ded22054bfd851bb3d864.exe 29 PID 1892 wrote to memory of 856 1892 49545f0af79ded22054bfd851bb3d864.exe 29 PID 856 wrote to memory of 764 856 explorer.exe 30 PID 856 wrote to memory of 764 856 explorer.exe 30 PID 856 wrote to memory of 764 856 explorer.exe 30 PID 856 wrote to memory of 764 856 explorer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\49545f0af79ded22054bfd851bb3d864.exe"C:\Users\Admin\AppData\Local\Temp\49545f0af79ded22054bfd851bb3d864.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\ProgramData\explorer.exe"C:\ProgramData\explorer.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\explorer.exe" "explorer.exe" ENABLE3⤵PID:764
-
-