Analysis
-
max time kernel
161s -
max time network
156s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 23:24
Static task
static1
Behavioral task
behavioral1
Sample
f7131d238936a8c24ce71706bb8050338623377f4189a106b3361fd1ffc6cac3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f7131d238936a8c24ce71706bb8050338623377f4189a106b3361fd1ffc6cac3.exe
Resource
win10-en-20211208
General
-
Target
f7131d238936a8c24ce71706bb8050338623377f4189a106b3361fd1ffc6cac3.exe
-
Size
40KB
-
MD5
ab9227ef1d109dfd789c9bdeb46605a0
-
SHA1
a9f1569c151195bfb32b2db0625085453aab69c3
-
SHA256
f7131d238936a8c24ce71706bb8050338623377f4189a106b3361fd1ffc6cac3
-
SHA512
6e204f7268af6df6f11e7b17ff9692a980d5abbfa23c7663e9779e7bceafc1cd22988b9163991c1916542e8c6ddd329c27b0e992e4b2f83d08d378131d1b8ac7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
system.exepid process 916 system.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
system.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c2f2fb4452e56e37a167c777bd338296.exe system.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c2f2fb4452e56e37a167c777bd338296.exe system.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
system.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\c2f2fb4452e56e37a167c777bd338296 = "\"C:\\Users\\Admin\\AppData\\Roaming\\system.exe\" .." system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\c2f2fb4452e56e37a167c777bd338296 = "\"C:\\Users\\Admin\\AppData\\Roaming\\system.exe\" .." system.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
system.exedescription pid process Token: SeDebugPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe Token: 33 916 system.exe Token: SeIncBasePriorityPrivilege 916 system.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f7131d238936a8c24ce71706bb8050338623377f4189a106b3361fd1ffc6cac3.exesystem.exedescription pid process target process PID 2660 wrote to memory of 916 2660 f7131d238936a8c24ce71706bb8050338623377f4189a106b3361fd1ffc6cac3.exe system.exe PID 2660 wrote to memory of 916 2660 f7131d238936a8c24ce71706bb8050338623377f4189a106b3361fd1ffc6cac3.exe system.exe PID 2660 wrote to memory of 916 2660 f7131d238936a8c24ce71706bb8050338623377f4189a106b3361fd1ffc6cac3.exe system.exe PID 916 wrote to memory of 3600 916 system.exe netsh.exe PID 916 wrote to memory of 3600 916 system.exe netsh.exe PID 916 wrote to memory of 3600 916 system.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7131d238936a8c24ce71706bb8050338623377f4189a106b3361fd1ffc6cac3.exe"C:\Users\Admin\AppData\Local\Temp\f7131d238936a8c24ce71706bb8050338623377f4189a106b3361fd1ffc6cac3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Roaming\system.exe"C:\Users\Admin\AppData\Roaming\system.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\system.exe" "system.exe" ENABLE3⤵PID:3600
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ab9227ef1d109dfd789c9bdeb46605a0
SHA1a9f1569c151195bfb32b2db0625085453aab69c3
SHA256f7131d238936a8c24ce71706bb8050338623377f4189a106b3361fd1ffc6cac3
SHA5126e204f7268af6df6f11e7b17ff9692a980d5abbfa23c7663e9779e7bceafc1cd22988b9163991c1916542e8c6ddd329c27b0e992e4b2f83d08d378131d1b8ac7
-
MD5
ab9227ef1d109dfd789c9bdeb46605a0
SHA1a9f1569c151195bfb32b2db0625085453aab69c3
SHA256f7131d238936a8c24ce71706bb8050338623377f4189a106b3361fd1ffc6cac3
SHA5126e204f7268af6df6f11e7b17ff9692a980d5abbfa23c7663e9779e7bceafc1cd22988b9163991c1916542e8c6ddd329c27b0e992e4b2f83d08d378131d1b8ac7