Analysis
-
max time kernel
137s -
max time network
188s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
14-09-2021 08:43
Static task
static1
Behavioral task
behavioral1
Sample
e07ce1ac09be171289b93538009c471c.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e07ce1ac09be171289b93538009c471c.exe
Resource
win10-en
windows10_x64
0 signatures
0 seconds
General
-
Target
e07ce1ac09be171289b93538009c471c.exe
-
Size
1.2MB
-
MD5
e07ce1ac09be171289b93538009c471c
-
SHA1
4e6780382f80731c03a5b3bee0fe806adfb03702
-
SHA256
d6140622785d188975ff7d8886fc4bf675597d064c939efe0d391e3dec0610d8
-
SHA512
afbe8f4a63d0e33ca0476eb284ad24c74dbafe3ec8c2961ce504b498df41fca0c1565480f1b26c6960ccdc3624c057e58aa40485a5302128473ce06261d4e3a6
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
e07ce1ac09be171289b93538009c471c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\vmnet = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\vmnet.exe\"" e07ce1ac09be171289b93538009c471c.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e07ce1ac09be171289b93538009c471c.exedescription pid process target process PID 2000 set thread context of 2040 2000 e07ce1ac09be171289b93538009c471c.exe e07ce1ac09be171289b93538009c471c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exee07ce1ac09be171289b93538009c471c.exee07ce1ac09be171289b93538009c471c.exepid process 1444 powershell.exe 1444 powershell.exe 2000 e07ce1ac09be171289b93538009c471c.exe 2000 e07ce1ac09be171289b93538009c471c.exe 2040 e07ce1ac09be171289b93538009c471c.exe 2040 e07ce1ac09be171289b93538009c471c.exe 2040 e07ce1ac09be171289b93538009c471c.exe 2040 e07ce1ac09be171289b93538009c471c.exe 2040 e07ce1ac09be171289b93538009c471c.exe 2040 e07ce1ac09be171289b93538009c471c.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
powershell.exee07ce1ac09be171289b93538009c471c.exee07ce1ac09be171289b93538009c471c.exedescription pid process Token: SeDebugPrivilege 1444 powershell.exe Token: SeIncreaseQuotaPrivilege 1444 powershell.exe Token: SeSecurityPrivilege 1444 powershell.exe Token: SeTakeOwnershipPrivilege 1444 powershell.exe Token: SeLoadDriverPrivilege 1444 powershell.exe Token: SeSystemProfilePrivilege 1444 powershell.exe Token: SeSystemtimePrivilege 1444 powershell.exe Token: SeProfSingleProcessPrivilege 1444 powershell.exe Token: SeIncBasePriorityPrivilege 1444 powershell.exe Token: SeCreatePagefilePrivilege 1444 powershell.exe Token: SeBackupPrivilege 1444 powershell.exe Token: SeRestorePrivilege 1444 powershell.exe Token: SeShutdownPrivilege 1444 powershell.exe Token: SeDebugPrivilege 1444 powershell.exe Token: SeSystemEnvironmentPrivilege 1444 powershell.exe Token: SeRemoteShutdownPrivilege 1444 powershell.exe Token: SeUndockPrivilege 1444 powershell.exe Token: SeManageVolumePrivilege 1444 powershell.exe Token: 33 1444 powershell.exe Token: 34 1444 powershell.exe Token: 35 1444 powershell.exe Token: SeIncreaseQuotaPrivilege 1444 powershell.exe Token: SeSecurityPrivilege 1444 powershell.exe Token: SeTakeOwnershipPrivilege 1444 powershell.exe Token: SeLoadDriverPrivilege 1444 powershell.exe Token: SeSystemProfilePrivilege 1444 powershell.exe Token: SeSystemtimePrivilege 1444 powershell.exe Token: SeProfSingleProcessPrivilege 1444 powershell.exe Token: SeIncBasePriorityPrivilege 1444 powershell.exe Token: SeCreatePagefilePrivilege 1444 powershell.exe Token: SeBackupPrivilege 1444 powershell.exe Token: SeRestorePrivilege 1444 powershell.exe Token: SeShutdownPrivilege 1444 powershell.exe Token: SeDebugPrivilege 1444 powershell.exe Token: SeSystemEnvironmentPrivilege 1444 powershell.exe Token: SeRemoteShutdownPrivilege 1444 powershell.exe Token: SeUndockPrivilege 1444 powershell.exe Token: SeManageVolumePrivilege 1444 powershell.exe Token: 33 1444 powershell.exe Token: 34 1444 powershell.exe Token: 35 1444 powershell.exe Token: SeDebugPrivilege 2000 e07ce1ac09be171289b93538009c471c.exe Token: SeDebugPrivilege 2040 e07ce1ac09be171289b93538009c471c.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
e07ce1ac09be171289b93538009c471c.exedescription pid process target process PID 2000 wrote to memory of 1444 2000 e07ce1ac09be171289b93538009c471c.exe powershell.exe PID 2000 wrote to memory of 1444 2000 e07ce1ac09be171289b93538009c471c.exe powershell.exe PID 2000 wrote to memory of 1444 2000 e07ce1ac09be171289b93538009c471c.exe powershell.exe PID 2000 wrote to memory of 2040 2000 e07ce1ac09be171289b93538009c471c.exe e07ce1ac09be171289b93538009c471c.exe PID 2000 wrote to memory of 2040 2000 e07ce1ac09be171289b93538009c471c.exe e07ce1ac09be171289b93538009c471c.exe PID 2000 wrote to memory of 2040 2000 e07ce1ac09be171289b93538009c471c.exe e07ce1ac09be171289b93538009c471c.exe PID 2000 wrote to memory of 2040 2000 e07ce1ac09be171289b93538009c471c.exe e07ce1ac09be171289b93538009c471c.exe PID 2000 wrote to memory of 2040 2000 e07ce1ac09be171289b93538009c471c.exe e07ce1ac09be171289b93538009c471c.exe PID 2000 wrote to memory of 2040 2000 e07ce1ac09be171289b93538009c471c.exe e07ce1ac09be171289b93538009c471c.exe PID 2000 wrote to memory of 2040 2000 e07ce1ac09be171289b93538009c471c.exe e07ce1ac09be171289b93538009c471c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e07ce1ac09be171289b93538009c471c.exe"C:\Users\Admin\AppData\Local\Temp\e07ce1ac09be171289b93538009c471c.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com , www.youtube.com , www.google.com , www.youtube.com ,www.google.com , www.youtube.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\e07ce1ac09be171289b93538009c471c.exeC:\Users\Admin\AppData\Local\Temp\e07ce1ac09be171289b93538009c471c.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040
-