Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 12:16
Static task
static1
Behavioral task
behavioral1
Sample
f373ebb32b2a836b78f932fd436ec49a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f373ebb32b2a836b78f932fd436ec49a.exe
Resource
win10-en-20211208
General
-
Target
f373ebb32b2a836b78f932fd436ec49a.exe
-
Size
492KB
-
MD5
f373ebb32b2a836b78f932fd436ec49a
-
SHA1
fdf344a3d5684433e689b61de782d5bd29f185b9
-
SHA256
47d178214e35dc1d7dca9886abd3fc3e715a934c5e8540e9f0879d5d1c8addee
-
SHA512
b5fadc8d050d2bae9b1f657f33d8b23d6ac0eb39fb962a64059fe5e39c73a85e5f998a53622e06811616c55d037b115a853794841a2f16354b65af3ca1ffdb48
Malware Config
Signatures
-
suricata: ET MALWARE OneLouder EXE download possibly installing Zeus P2P
suricata: ET MALWARE OneLouder EXE download possibly installing Zeus P2P
-
suricata: ET MALWARE Probable OneLouder downloader (Zeus P2P) exe download
suricata: ET MALWARE Probable OneLouder downloader (Zeus P2P) exe download
-
suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Request M1
suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Request M1
-
suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Server Response M1
suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Server Response M1
-
Executes dropped EXE 4 IoCs
pid Process 604 7zz.exe 896 ojbkcg.exe 1712 111.exe 1752 7z.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\╧╘┐¿╟²╢».lnk 7z.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\╧╘┐¿╟²╢».lnk 7z.exe -
Loads dropped DLL 9 IoCs
pid Process 740 f373ebb32b2a836b78f932fd436ec49a.exe 740 f373ebb32b2a836b78f932fd436ec49a.exe 740 f373ebb32b2a836b78f932fd436ec49a.exe 896 ojbkcg.exe 1712 111.exe 1712 111.exe 1712 111.exe 1712 111.exe 1752 7z.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 740 f373ebb32b2a836b78f932fd436ec49a.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1752 7z.exe Token: 35 1752 7z.exe Token: SeSecurityPrivilege 1752 7z.exe Token: SeSecurityPrivilege 1752 7z.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1712 111.exe 1712 111.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 740 wrote to memory of 604 740 f373ebb32b2a836b78f932fd436ec49a.exe 29 PID 740 wrote to memory of 604 740 f373ebb32b2a836b78f932fd436ec49a.exe 29 PID 740 wrote to memory of 604 740 f373ebb32b2a836b78f932fd436ec49a.exe 29 PID 740 wrote to memory of 604 740 f373ebb32b2a836b78f932fd436ec49a.exe 29 PID 740 wrote to memory of 896 740 f373ebb32b2a836b78f932fd436ec49a.exe 31 PID 740 wrote to memory of 896 740 f373ebb32b2a836b78f932fd436ec49a.exe 31 PID 740 wrote to memory of 896 740 f373ebb32b2a836b78f932fd436ec49a.exe 31 PID 740 wrote to memory of 896 740 f373ebb32b2a836b78f932fd436ec49a.exe 31 PID 1712 wrote to memory of 1752 1712 111.exe 34 PID 1712 wrote to memory of 1752 1712 111.exe 34 PID 1712 wrote to memory of 1752 1712 111.exe 34 PID 1712 wrote to memory of 1752 1712 111.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f373ebb32b2a836b78f932fd436ec49a.exe"C:\Users\Admin\AppData\Local\Temp\f373ebb32b2a836b78f932fd436ec49a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Public\Videos\1643375820\7zz.exe"C:\Users\Public\Videos\1643375820\7zz.exe" X -ep2 C:\Users\Public\Videos\1643375820\1.rar C:\Users\Public\Videos\16433758202⤵
- Executes dropped EXE
PID:604
-
-
C:\Users\Public\Videos\1643375820\ojbkcg.exe"C:\Users\Public\Videos\1643375820\ojbkcg.exe" -a2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:896
-
-
C:\Users\Public\Documents\auto\111.exe"C:\Users\Public\Documents\auto\111.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\ProgramData\7z.exe"C:\ProgramData\7z.exe" x C:\ProgramData\bb.zip -oC:\Users\Admin\AppData\Roaming\Microsoft\Windows2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1752
-