Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
07-12-2021 02:23
Static task
static1
Behavioral task
behavioral1
Sample
d1279da0ffbc04887863ac95a894f275.exe
Resource
win7-en-20211014
General
-
Target
d1279da0ffbc04887863ac95a894f275.exe
-
Size
543KB
-
MD5
d1279da0ffbc04887863ac95a894f275
-
SHA1
b0e8eccb61fd44315e03101ee0084367a8379295
-
SHA256
c004cf20f130b80a6a52e8999ed94795d1fd9f8ae35ccda173bcb2cbeccf3888
-
SHA512
8e723b67cb0fdfd2273b44e04c38ab5fe0c7297153cd3296786cd2dae05cd01ab891086d40f5a21e44e9e4d51f81a7d78be7ab538447d53168ec316156c8bde6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1880 1100 WerFault.exe d1279da0ffbc04887863ac95a894f275.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
WerFault.exepowershell.exepid process 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 1924 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1880 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
WerFault.exepowershell.exedescription pid process Token: SeDebugPrivilege 1880 WerFault.exe Token: SeDebugPrivilege 1924 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d1279da0ffbc04887863ac95a894f275.exedescription pid process target process PID 1100 wrote to memory of 1924 1100 d1279da0ffbc04887863ac95a894f275.exe powershell.exe PID 1100 wrote to memory of 1924 1100 d1279da0ffbc04887863ac95a894f275.exe powershell.exe PID 1100 wrote to memory of 1924 1100 d1279da0ffbc04887863ac95a894f275.exe powershell.exe PID 1100 wrote to memory of 1924 1100 d1279da0ffbc04887863ac95a894f275.exe powershell.exe PID 1100 wrote to memory of 1436 1100 d1279da0ffbc04887863ac95a894f275.exe schtasks.exe PID 1100 wrote to memory of 1436 1100 d1279da0ffbc04887863ac95a894f275.exe schtasks.exe PID 1100 wrote to memory of 1436 1100 d1279da0ffbc04887863ac95a894f275.exe schtasks.exe PID 1100 wrote to memory of 1436 1100 d1279da0ffbc04887863ac95a894f275.exe schtasks.exe PID 1100 wrote to memory of 1880 1100 d1279da0ffbc04887863ac95a894f275.exe WerFault.exe PID 1100 wrote to memory of 1880 1100 d1279da0ffbc04887863ac95a894f275.exe WerFault.exe PID 1100 wrote to memory of 1880 1100 d1279da0ffbc04887863ac95a894f275.exe WerFault.exe PID 1100 wrote to memory of 1880 1100 d1279da0ffbc04887863ac95a894f275.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1279da0ffbc04887863ac95a894f275.exe"C:\Users\Admin\AppData\Local\Temp\d1279da0ffbc04887863ac95a894f275.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\VfZFoFXb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VfZFoFXb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8141.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 9802⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp8141.tmpMD5
1d5246bfe8c721e9a5266ce09d63cc12
SHA18d470171907643efe071e7e77eb9df09d2881c19
SHA2567d0963a0db1672b3e7f01936df3ff090c3bcf5a8ce71fa0273e43172a2442d80
SHA512fc2c8ea5a69369cdfd166252ba1d17582c16aaa57c956eebf95afb4ec51887278cd15bb8d90a7f7dcd420edfbab17b1a06b73815772ed7ad861b0329a94e8b1a
-
memory/1100-55-0x0000000000210000-0x0000000000211000-memory.dmpFilesize
4KB
-
memory/1100-57-0x00000000768A1000-0x00000000768A3000-memory.dmpFilesize
8KB
-
memory/1100-58-0x0000000004D30000-0x0000000004D31000-memory.dmpFilesize
4KB
-
memory/1100-59-0x0000000000740000-0x0000000000748000-memory.dmpFilesize
32KB
-
memory/1100-60-0x0000000004380000-0x00000000043F0000-memory.dmpFilesize
448KB
-
memory/1436-63-0x0000000000000000-mapping.dmp
-
memory/1880-65-0x0000000000000000-mapping.dmp
-
memory/1880-69-0x0000000000530000-0x0000000000531000-memory.dmpFilesize
4KB
-
memory/1924-61-0x0000000000000000-mapping.dmp
-
memory/1924-66-0x00000000024A0000-0x00000000030EA000-memory.dmpFilesize
12.3MB
-
memory/1924-68-0x00000000024A0000-0x00000000030EA000-memory.dmpFilesize
12.3MB
-
memory/1924-67-0x00000000024A0000-0x00000000030EA000-memory.dmpFilesize
12.3MB