Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 12:16
Static task
static1
Behavioral task
behavioral1
Sample
3ec149660a6808f711ca6cb6b20c1dda.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3ec149660a6808f711ca6cb6b20c1dda.exe
Resource
win10-en-20211208
General
-
Target
3ec149660a6808f711ca6cb6b20c1dda.exe
-
Size
658KB
-
MD5
3ec149660a6808f711ca6cb6b20c1dda
-
SHA1
45c3d1d8dd512c01fd6c897c67b35c13c49828cb
-
SHA256
2d288f2cd6752a01360f2669959e2c61f676f8156d5cc40d4b415245ae04cf6d
-
SHA512
3a15e7bfbabeb296001086453320a133dc242ef170ccf45d459d2a7f402fadfe3329099d79b368416d565ba0c16eb051b64fe7b756c21f822ab49ec483b5649d
Malware Config
Signatures
-
suricata: ET MALWARE OneLouder EXE download possibly installing Zeus P2P
suricata: ET MALWARE OneLouder EXE download possibly installing Zeus P2P
-
suricata: ET MALWARE Probable OneLouder downloader (Zeus P2P) exe download
suricata: ET MALWARE Probable OneLouder downloader (Zeus P2P) exe download
-
suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Request M1
suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Request M1
-
suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Server Response M1
suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Server Response M1
-
Executes dropped EXE 4 IoCs
pid Process 436 7zz.exe 1140 ojbkcg.exe 1912 111.exe 1092 7z.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\╧╘┐¿╟²╢».lnk 7z.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\╧╘┐¿╟²╢».lnk 7z.exe -
Loads dropped DLL 8 IoCs
pid Process 1668 3ec149660a6808f711ca6cb6b20c1dda.exe 1668 3ec149660a6808f711ca6cb6b20c1dda.exe 1140 ojbkcg.exe 1912 111.exe 1912 111.exe 1912 111.exe 1912 111.exe 1092 7z.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1668 3ec149660a6808f711ca6cb6b20c1dda.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1092 7z.exe Token: 35 1092 7z.exe Token: SeSecurityPrivilege 1092 7z.exe Token: SeSecurityPrivilege 1092 7z.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1912 111.exe 1912 111.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1668 wrote to memory of 436 1668 3ec149660a6808f711ca6cb6b20c1dda.exe 29 PID 1668 wrote to memory of 436 1668 3ec149660a6808f711ca6cb6b20c1dda.exe 29 PID 1668 wrote to memory of 436 1668 3ec149660a6808f711ca6cb6b20c1dda.exe 29 PID 1668 wrote to memory of 436 1668 3ec149660a6808f711ca6cb6b20c1dda.exe 29 PID 1668 wrote to memory of 1140 1668 3ec149660a6808f711ca6cb6b20c1dda.exe 31 PID 1668 wrote to memory of 1140 1668 3ec149660a6808f711ca6cb6b20c1dda.exe 31 PID 1668 wrote to memory of 1140 1668 3ec149660a6808f711ca6cb6b20c1dda.exe 31 PID 1912 wrote to memory of 1092 1912 111.exe 34 PID 1912 wrote to memory of 1092 1912 111.exe 34 PID 1912 wrote to memory of 1092 1912 111.exe 34 PID 1912 wrote to memory of 1092 1912 111.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ec149660a6808f711ca6cb6b20c1dda.exe"C:\Users\Admin\AppData\Local\Temp\3ec149660a6808f711ca6cb6b20c1dda.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Public\Videos\1643375786\7zz.exe"C:\Users\Public\Videos\1643375786\7zz.exe" X -ep2 C:\Users\Public\Videos\1643375786\1.rar C:\Users\Public\Videos\16433757862⤵
- Executes dropped EXE
PID:436
-
-
C:\Users\Public\Videos\1643375786\ojbkcg.exe"C:\Users\Public\Videos\1643375786\ojbkcg.exe" -a2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1140
-
-
C:\Users\Public\Documents\auto\111.exe"C:\Users\Public\Documents\auto\111.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\ProgramData\7z.exe"C:\ProgramData\7z.exe" x C:\ProgramData\bb.zip -oC:\Users\Admin\AppData\Roaming\Microsoft\Windows2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1092
-