Analysis
-
max time kernel
117s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
22-01-2022 07:47
Static task
static1
Behavioral task
behavioral1
Sample
IMG_212022100120011.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
IMG_212022100120011.exe
Resource
win10-en-20211208
General
-
Target
IMG_212022100120011.exe
-
Size
69KB
-
MD5
cecfdefc8f201d03066386a9a6b011f0
-
SHA1
fd451496139859f387cfef71404d50d042297ca0
-
SHA256
5b476b935cae4bf02299f7dee135b0bb091fd7716b2973d7172e04f4f2985d72
-
SHA512
aed76f8f33573fc1b62fd9e194e797fbccb7209e526ef6dc980882c6b889db6b6742e88d8fad0e0e29bc4620b7ae857be02cab380439cb231748c1fbc3d2fd8b
Malware Config
Signatures
-
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/908-62-0x0000000000400000-0x000000000041A000-memory.dmp asyncrat behavioral1/memory/908-63-0x0000000000400000-0x000000000041A000-memory.dmp asyncrat behavioral1/memory/908-64-0x0000000000400000-0x000000000041A000-memory.dmp asyncrat behavioral1/memory/908-65-0x0000000000400000-0x000000000041A000-memory.dmp asyncrat -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
IMG_212022100120011.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mword = "\"C:\\Users\\Admin\\AppData\\Roaming\\Word\\Mword.exe\"" IMG_212022100120011.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
IMG_212022100120011.exedescription pid process target process PID 1648 set thread context of 908 1648 IMG_212022100120011.exe IMG_212022100120011.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 12 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 284 PING.EXE 1132 PING.EXE 544 PING.EXE 1180 PING.EXE 996 PING.EXE 708 PING.EXE 1048 PING.EXE 1180 PING.EXE 1012 PING.EXE 1956 PING.EXE 1216 PING.EXE 240 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
IMG_212022100120011.exepid process 1648 IMG_212022100120011.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
IMG_212022100120011.exeIMG_212022100120011.exedescription pid process Token: SeDebugPrivilege 1648 IMG_212022100120011.exe Token: SeDebugPrivilege 908 IMG_212022100120011.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
IMG_212022100120011.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1648 wrote to memory of 588 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 588 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 588 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 588 1648 IMG_212022100120011.exe cmd.exe PID 588 wrote to memory of 996 588 cmd.exe PING.EXE PID 588 wrote to memory of 996 588 cmd.exe PING.EXE PID 588 wrote to memory of 996 588 cmd.exe PING.EXE PID 588 wrote to memory of 996 588 cmd.exe PING.EXE PID 1648 wrote to memory of 556 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 556 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 556 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 556 1648 IMG_212022100120011.exe cmd.exe PID 556 wrote to memory of 708 556 cmd.exe PING.EXE PID 556 wrote to memory of 708 556 cmd.exe PING.EXE PID 556 wrote to memory of 708 556 cmd.exe PING.EXE PID 556 wrote to memory of 708 556 cmd.exe PING.EXE PID 1648 wrote to memory of 1664 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1664 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1664 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1664 1648 IMG_212022100120011.exe cmd.exe PID 1664 wrote to memory of 1048 1664 cmd.exe PING.EXE PID 1664 wrote to memory of 1048 1664 cmd.exe PING.EXE PID 1664 wrote to memory of 1048 1664 cmd.exe PING.EXE PID 1664 wrote to memory of 1048 1664 cmd.exe PING.EXE PID 1648 wrote to memory of 1372 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1372 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1372 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1372 1648 IMG_212022100120011.exe cmd.exe PID 1372 wrote to memory of 1180 1372 cmd.exe PING.EXE PID 1372 wrote to memory of 1180 1372 cmd.exe PING.EXE PID 1372 wrote to memory of 1180 1372 cmd.exe PING.EXE PID 1372 wrote to memory of 1180 1372 cmd.exe PING.EXE PID 1648 wrote to memory of 1868 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1868 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1868 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1868 1648 IMG_212022100120011.exe cmd.exe PID 1868 wrote to memory of 1012 1868 cmd.exe PING.EXE PID 1868 wrote to memory of 1012 1868 cmd.exe PING.EXE PID 1868 wrote to memory of 1012 1868 cmd.exe PING.EXE PID 1868 wrote to memory of 1012 1868 cmd.exe PING.EXE PID 1648 wrote to memory of 1704 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1704 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1704 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1704 1648 IMG_212022100120011.exe cmd.exe PID 1704 wrote to memory of 284 1704 cmd.exe PING.EXE PID 1704 wrote to memory of 284 1704 cmd.exe PING.EXE PID 1704 wrote to memory of 284 1704 cmd.exe PING.EXE PID 1704 wrote to memory of 284 1704 cmd.exe PING.EXE PID 1648 wrote to memory of 1948 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1948 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1948 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 1948 1648 IMG_212022100120011.exe cmd.exe PID 1948 wrote to memory of 1956 1948 cmd.exe PING.EXE PID 1948 wrote to memory of 1956 1948 cmd.exe PING.EXE PID 1948 wrote to memory of 1956 1948 cmd.exe PING.EXE PID 1948 wrote to memory of 1956 1948 cmd.exe PING.EXE PID 1648 wrote to memory of 808 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 808 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 808 1648 IMG_212022100120011.exe cmd.exe PID 1648 wrote to memory of 808 1648 IMG_212022100120011.exe cmd.exe PID 808 wrote to memory of 1216 808 cmd.exe PING.EXE PID 808 wrote to memory of 1216 808 cmd.exe PING.EXE PID 808 wrote to memory of 1216 808 cmd.exe PING.EXE PID 808 wrote to memory of 1216 808 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG_212022100120011.exe"C:\Users\Admin\AppData\Local\Temp\IMG_212022100120011.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping google.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping google.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping facebook.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping facebook.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping twitter.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping twitter.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping google.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping google.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping facebook.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping facebook.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping twitter.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping twitter.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping google.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping google.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping facebook.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping facebook.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping twitter.com2⤵
-
C:\Windows\SysWOW64\PING.EXEping twitter.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping google.com2⤵
-
C:\Windows\SysWOW64\PING.EXEping google.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping facebook.com2⤵
-
C:\Windows\SysWOW64\PING.EXEping facebook.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping twitter.com2⤵
-
C:\Windows\SysWOW64\PING.EXEping twitter.com3⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\IMG_212022100120011.exeC:\Users\Admin\AppData\Local\Temp\IMG_212022100120011.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
82d5f2ada7bc39b802c8723a7436f458
SHA1157136a2cde4f5d9e054971ab4008b1e4dcf66fc
SHA256f2a8b34b37370879a13a6ce38275b88334c5f81d39fcefd1d97e8fa8dfc9bcb7
SHA512073f675d452806d399f8618fc8bd20c2f3a7a02f31b73ad5cd39cd73491968954268e82028f4ad59dd75e9b6c4fb6a2cf24231fb7afed50ea4bd6ed6011658b6
-
memory/908-63-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/908-65-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/908-69-0x00000000004D0000-0x00000000004DA000-memory.dmpFilesize
40KB
-
memory/908-67-0x0000000004B10000-0x0000000004B11000-memory.dmpFilesize
4KB
-
memory/908-64-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/908-60-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/908-61-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/908-62-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1648-54-0x0000000000D40000-0x0000000000D56000-memory.dmpFilesize
88KB
-
memory/1648-59-0x0000000004D80000-0x0000000004DCC000-memory.dmpFilesize
304KB
-
memory/1648-56-0x0000000005640000-0x0000000005641000-memory.dmpFilesize
4KB
-
memory/1648-58-0x0000000000CF0000-0x0000000000D24000-memory.dmpFilesize
208KB
-
memory/1648-55-0x0000000076451000-0x0000000076453000-memory.dmpFilesize
8KB
-
memory/1648-57-0x0000000000B40000-0x0000000000B8C000-memory.dmpFilesize
304KB