Analysis
-
max time kernel
148s -
max time network
195s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
04-06-2021 07:23
Static task
static1
Behavioral task
behavioral1
Sample
1502cb8a7caf4853614f9fd8f860631e.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
1502cb8a7caf4853614f9fd8f860631e.exe
Resource
win10v20210408
General
-
Target
1502cb8a7caf4853614f9fd8f860631e.exe
-
Size
721KB
-
MD5
1502cb8a7caf4853614f9fd8f860631e
-
SHA1
813dc57d206536db600a16f8a5da362240cb8516
-
SHA256
bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0
-
SHA512
fa4c28bb760aabba20e7dbf98fe093687cd18c072bca07ed650c01fdee2c498bc8a89e2a6b41a6ca72762d7a2616e207562ee5f3b253fe375b8ff239294bef08
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
despacito.exepid process 536 despacito.exe -
Processes:
resource yara_rule behavioral1/memory/1056-74-0x0000000000400000-0x00000000004EA000-memory.dmp upx behavioral1/memory/1056-77-0x0000000000400000-0x00000000004EA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
despacito.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\updator = "C:\\Users\\Admin\\Music\\despacito.exe -boot" despacito.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
despacito.exedescription pid process target process PID 536 set thread context of 1056 536 despacito.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
despacito.exepid process 536 despacito.exe 536 despacito.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1502cb8a7caf4853614f9fd8f860631e.exedespacito.exedescription pid process Token: SeDebugPrivilege 1664 1502cb8a7caf4853614f9fd8f860631e.exe Token: SeDebugPrivilege 536 despacito.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
1502cb8a7caf4853614f9fd8f860631e.exeexplorer.exedespacito.exedescription pid process target process PID 1664 wrote to memory of 1600 1664 1502cb8a7caf4853614f9fd8f860631e.exe cmd.exe PID 1664 wrote to memory of 1600 1664 1502cb8a7caf4853614f9fd8f860631e.exe cmd.exe PID 1664 wrote to memory of 1600 1664 1502cb8a7caf4853614f9fd8f860631e.exe cmd.exe PID 1664 wrote to memory of 1600 1664 1502cb8a7caf4853614f9fd8f860631e.exe cmd.exe PID 1664 wrote to memory of 332 1664 1502cb8a7caf4853614f9fd8f860631e.exe explorer.exe PID 1664 wrote to memory of 332 1664 1502cb8a7caf4853614f9fd8f860631e.exe explorer.exe PID 1664 wrote to memory of 332 1664 1502cb8a7caf4853614f9fd8f860631e.exe explorer.exe PID 1664 wrote to memory of 332 1664 1502cb8a7caf4853614f9fd8f860631e.exe explorer.exe PID 576 wrote to memory of 536 576 explorer.exe despacito.exe PID 576 wrote to memory of 536 576 explorer.exe despacito.exe PID 576 wrote to memory of 536 576 explorer.exe despacito.exe PID 576 wrote to memory of 536 576 explorer.exe despacito.exe PID 536 wrote to memory of 1056 536 despacito.exe AppLaunch.exe PID 536 wrote to memory of 1056 536 despacito.exe AppLaunch.exe PID 536 wrote to memory of 1056 536 despacito.exe AppLaunch.exe PID 536 wrote to memory of 1056 536 despacito.exe AppLaunch.exe PID 536 wrote to memory of 1056 536 despacito.exe AppLaunch.exe PID 536 wrote to memory of 1056 536 despacito.exe AppLaunch.exe PID 536 wrote to memory of 1056 536 despacito.exe AppLaunch.exe PID 536 wrote to memory of 1056 536 despacito.exe AppLaunch.exe PID 536 wrote to memory of 1056 536 despacito.exe AppLaunch.exe PID 536 wrote to memory of 1056 536 despacito.exe AppLaunch.exe PID 536 wrote to memory of 1056 536 despacito.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1502cb8a7caf4853614f9fd8f860631e.exe"C:\Users\Admin\AppData\Local\Temp\1502cb8a7caf4853614f9fd8f860631e.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\1502cb8a7caf4853614f9fd8f860631e.exe" "C:\Users\Admin\Music\despacito.exe"2⤵PID:1600
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" /c, "C:\Users\Admin\Music\despacito.exe"2⤵PID:332
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\Music\despacito.exe"C:\Users\Admin\Music\despacito.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"3⤵PID:1056
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1502cb8a7caf4853614f9fd8f860631e
SHA1813dc57d206536db600a16f8a5da362240cb8516
SHA256bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0
SHA512fa4c28bb760aabba20e7dbf98fe093687cd18c072bca07ed650c01fdee2c498bc8a89e2a6b41a6ca72762d7a2616e207562ee5f3b253fe375b8ff239294bef08
-
MD5
1502cb8a7caf4853614f9fd8f860631e
SHA1813dc57d206536db600a16f8a5da362240cb8516
SHA256bdc5cb40d2d655865ed182688f4cb623c545dd9875c6198bf16d616e53c52eb0
SHA512fa4c28bb760aabba20e7dbf98fe093687cd18c072bca07ed650c01fdee2c498bc8a89e2a6b41a6ca72762d7a2616e207562ee5f3b253fe375b8ff239294bef08