Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-12-2021 14:32
Static task
static1
Behavioral task
behavioral1
Sample
72611A2A7DB8978D61F2D8659CD56C0595D96AC7FBB03.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
72611A2A7DB8978D61F2D8659CD56C0595D96AC7FBB03.exe
Resource
win10-en-20211208
General
-
Target
72611A2A7DB8978D61F2D8659CD56C0595D96AC7FBB03.exe
-
Size
158KB
-
MD5
d682f703d4b78ad2c57d3fc91e40df9b
-
SHA1
49dfe802bf98c59eff10dbe8ec360ed53114bb6a
-
SHA256
72611a2a7db8978d61f2d8659cd56c0595d96ac7fbb03adcc6000e40760062e7
-
SHA512
384e5269ba21c749c9d320688d866e2047891744d4059767fb7e9230908016b9fc12fda4df20647555f6e68fafc5ffe2cbe0b780049de8c76c275c7cdb83a5c1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Microsoft OneDrive.exepid process 1896 Microsoft OneDrive.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
Microsoft OneDrive.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e670d2a55524d983fee0be3df7ccf301.exe Microsoft OneDrive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e670d2a55524d983fee0be3df7ccf301.exe Microsoft OneDrive.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Microsoft OneDrive.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\e670d2a55524d983fee0be3df7ccf301 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft OneDrive.exe\" .." Microsoft OneDrive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\e670d2a55524d983fee0be3df7ccf301 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft OneDrive.exe\" .." Microsoft OneDrive.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
Microsoft OneDrive.exedescription pid process Token: SeDebugPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe Token: 33 1896 Microsoft OneDrive.exe Token: SeIncBasePriorityPrivilege 1896 Microsoft OneDrive.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
72611A2A7DB8978D61F2D8659CD56C0595D96AC7FBB03.exeMicrosoft OneDrive.exedescription pid process target process PID 1520 wrote to memory of 1896 1520 72611A2A7DB8978D61F2D8659CD56C0595D96AC7FBB03.exe Microsoft OneDrive.exe PID 1520 wrote to memory of 1896 1520 72611A2A7DB8978D61F2D8659CD56C0595D96AC7FBB03.exe Microsoft OneDrive.exe PID 1520 wrote to memory of 1896 1520 72611A2A7DB8978D61F2D8659CD56C0595D96AC7FBB03.exe Microsoft OneDrive.exe PID 1896 wrote to memory of 1472 1896 Microsoft OneDrive.exe netsh.exe PID 1896 wrote to memory of 1472 1896 Microsoft OneDrive.exe netsh.exe PID 1896 wrote to memory of 1472 1896 Microsoft OneDrive.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72611A2A7DB8978D61F2D8659CD56C0595D96AC7FBB03.exe"C:\Users\Admin\AppData\Local\Temp\72611A2A7DB8978D61F2D8659CD56C0595D96AC7FBB03.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe" "Microsoft OneDrive.exe" ENABLE3⤵PID:1472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d682f703d4b78ad2c57d3fc91e40df9b
SHA149dfe802bf98c59eff10dbe8ec360ed53114bb6a
SHA25672611a2a7db8978d61f2d8659cd56c0595d96ac7fbb03adcc6000e40760062e7
SHA512384e5269ba21c749c9d320688d866e2047891744d4059767fb7e9230908016b9fc12fda4df20647555f6e68fafc5ffe2cbe0b780049de8c76c275c7cdb83a5c1
-
MD5
d682f703d4b78ad2c57d3fc91e40df9b
SHA149dfe802bf98c59eff10dbe8ec360ed53114bb6a
SHA25672611a2a7db8978d61f2d8659cd56c0595d96ac7fbb03adcc6000e40760062e7
SHA512384e5269ba21c749c9d320688d866e2047891744d4059767fb7e9230908016b9fc12fda4df20647555f6e68fafc5ffe2cbe0b780049de8c76c275c7cdb83a5c1