Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
25-01-2022 03:12
Static task
static1
Behavioral task
behavioral1
Sample
b444ad46648439ce627075373ceba888.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b444ad46648439ce627075373ceba888.exe
Resource
win10-en-20211208
General
-
Target
b444ad46648439ce627075373ceba888.exe
-
Size
44KB
-
MD5
b444ad46648439ce627075373ceba888
-
SHA1
3ced85300587a1d284fbe31e91f94b4192edd35a
-
SHA256
2c619425072b006b1a74b653d5ab431a0f00678d8c04a4eed67833c3a876b180
-
SHA512
08e83f68817892bb4ca50f789dbbbe4dafd2ecd64d1ef2ecca6710d07ccce95ba5d9912b10190ce89fdbe3870285934fe6a94fdf46e6ebb9b871b4f4c9451e3f
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
srchost.exeServer.exeServer.exepid process 960 srchost.exe 512 Server.exe 2692 Server.exe -
Drops startup file 2 IoCs
Processes:
srchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\srchost32.exe srchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\srchost32.exe srchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
srchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\srchost.exe\" .." srchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\srchost.exe\" .." srchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
b444ad46648439ce627075373ceba888.exesrchost.exepid process 3704 b444ad46648439ce627075373ceba888.exe 960 srchost.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
srchost.exedescription pid process Token: SeDebugPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe Token: 33 960 srchost.exe Token: SeIncBasePriorityPrivilege 960 srchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b444ad46648439ce627075373ceba888.exesrchost.exedescription pid process target process PID 3704 wrote to memory of 960 3704 b444ad46648439ce627075373ceba888.exe srchost.exe PID 3704 wrote to memory of 960 3704 b444ad46648439ce627075373ceba888.exe srchost.exe PID 3704 wrote to memory of 960 3704 b444ad46648439ce627075373ceba888.exe srchost.exe PID 960 wrote to memory of 3756 960 srchost.exe schtasks.exe PID 960 wrote to memory of 3756 960 srchost.exe schtasks.exe PID 960 wrote to memory of 3756 960 srchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b444ad46648439ce627075373ceba888.exe"C:\Users\Admin\AppData\Local\Temp\b444ad46648439ce627075373ceba888.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\srchost.exe"C:\Users\Admin\AppData\Local\Temp\srchost.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn Server /tr C:\Users\Admin\AppData\Local\Temp/Server.exe3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp/Server.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Server.exe.logMD5
0de4a673c46d192f575c41e7c80ffc3e
SHA17a1da7e8ec2efd904ecb237ebedd4d7a3ee826f1
SHA256c18d0ff8e7b83a8623a8515d91d65f68deef6da9f68d84886864177f45acbf65
SHA512b505619848b2f6038e68a2d7baaa4cf314d39023a5b7a32001262ecda03a905986ac8a45a249745e29637b0acfaba1ae06bfaecc678283a808e6f9f4b455e209
-
C:\Users\Admin\AppData\Local\Temp\Server.exeMD5
b444ad46648439ce627075373ceba888
SHA13ced85300587a1d284fbe31e91f94b4192edd35a
SHA2562c619425072b006b1a74b653d5ab431a0f00678d8c04a4eed67833c3a876b180
SHA51208e83f68817892bb4ca50f789dbbbe4dafd2ecd64d1ef2ecca6710d07ccce95ba5d9912b10190ce89fdbe3870285934fe6a94fdf46e6ebb9b871b4f4c9451e3f
-
C:\Users\Admin\AppData\Local\Temp\Server.exeMD5
b444ad46648439ce627075373ceba888
SHA13ced85300587a1d284fbe31e91f94b4192edd35a
SHA2562c619425072b006b1a74b653d5ab431a0f00678d8c04a4eed67833c3a876b180
SHA51208e83f68817892bb4ca50f789dbbbe4dafd2ecd64d1ef2ecca6710d07ccce95ba5d9912b10190ce89fdbe3870285934fe6a94fdf46e6ebb9b871b4f4c9451e3f
-
C:\Users\Admin\AppData\Local\Temp\Server.exeMD5
b444ad46648439ce627075373ceba888
SHA13ced85300587a1d284fbe31e91f94b4192edd35a
SHA2562c619425072b006b1a74b653d5ab431a0f00678d8c04a4eed67833c3a876b180
SHA51208e83f68817892bb4ca50f789dbbbe4dafd2ecd64d1ef2ecca6710d07ccce95ba5d9912b10190ce89fdbe3870285934fe6a94fdf46e6ebb9b871b4f4c9451e3f
-
C:\Users\Admin\AppData\Local\Temp\srchost.exeMD5
b444ad46648439ce627075373ceba888
SHA13ced85300587a1d284fbe31e91f94b4192edd35a
SHA2562c619425072b006b1a74b653d5ab431a0f00678d8c04a4eed67833c3a876b180
SHA51208e83f68817892bb4ca50f789dbbbe4dafd2ecd64d1ef2ecca6710d07ccce95ba5d9912b10190ce89fdbe3870285934fe6a94fdf46e6ebb9b871b4f4c9451e3f
-
C:\Users\Admin\AppData\Local\Temp\srchost.exeMD5
b444ad46648439ce627075373ceba888
SHA13ced85300587a1d284fbe31e91f94b4192edd35a
SHA2562c619425072b006b1a74b653d5ab431a0f00678d8c04a4eed67833c3a876b180
SHA51208e83f68817892bb4ca50f789dbbbe4dafd2ecd64d1ef2ecca6710d07ccce95ba5d9912b10190ce89fdbe3870285934fe6a94fdf46e6ebb9b871b4f4c9451e3f
-
memory/512-128-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/960-123-0x0000000005570000-0x000000000557A000-memory.dmpFilesize
40KB
-
memory/960-124-0x0000000005880000-0x00000000058E6000-memory.dmpFilesize
408KB
-
memory/960-125-0x00000000066F0000-0x0000000006708000-memory.dmpFilesize
96KB
-
memory/960-122-0x0000000005230000-0x00000000052CC000-memory.dmpFilesize
624KB
-
memory/2692-131-0x0000000004E70000-0x0000000004F0C000-memory.dmpFilesize
624KB
-
memory/3704-115-0x0000000000BB0000-0x0000000000BC0000-memory.dmpFilesize
64KB
-
memory/3704-119-0x0000000005360000-0x00000000053FC000-memory.dmpFilesize
624KB
-
memory/3704-118-0x00000000057E0000-0x0000000005872000-memory.dmpFilesize
584KB
-
memory/3704-117-0x0000000005BE0000-0x00000000060DE000-memory.dmpFilesize
5.0MB
-
memory/3704-116-0x0000000005440000-0x00000000054DC000-memory.dmpFilesize
624KB