Analysis
-
max time kernel
4294210s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
14-04-2022 06:55
Static task
static1
Behavioral task
behavioral1
Sample
2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe
Resource
win10v2004-20220310-en
General
-
Target
2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe
-
Size
938KB
-
MD5
6b2c64128bf247c7b987c65c9de3f81c
-
SHA1
1629ef7f8e13baa063afc0f97a5cb755b68e331f
-
SHA256
2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e
-
SHA512
11ac5c09556cf0d99a7ad5d38ca397edcb4c9ce188706729f85b56eb07973d448bed9c8864b542a51e25f33dec6f5b1c4499b95855874b3113b8becc3a6114bb
Malware Config
Signatures
-
suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016
suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016
-
suricata: ET MALWARE Possible Malicious Macro EXE DL AlphaNumL
suricata: ET MALWARE Possible Malicious Macro EXE DL AlphaNumL
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1064 set thread context of 1552 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 828 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1064 wrote to memory of 828 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 30 PID 1064 wrote to memory of 828 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 30 PID 1064 wrote to memory of 828 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 30 PID 1064 wrote to memory of 828 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 30 PID 1064 wrote to memory of 1552 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 32 PID 1064 wrote to memory of 1552 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 32 PID 1064 wrote to memory of 1552 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 32 PID 1064 wrote to memory of 1552 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 32 PID 1064 wrote to memory of 1552 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 32 PID 1064 wrote to memory of 1552 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 32 PID 1064 wrote to memory of 1552 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 32 PID 1064 wrote to memory of 1552 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 32 PID 1064 wrote to memory of 1552 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 32 PID 1064 wrote to memory of 1552 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 32 PID 1064 wrote to memory of 1552 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 32 PID 1064 wrote to memory of 1552 1064 2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe"C:\Users\Admin\AppData\Local\Temp\2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FHOjyTEIyyf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2ECE.tmp"2⤵
- Creates scheduled task(s)
PID:828
-
-
C:\Users\Admin\AppData\Local\Temp\2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e.exe"{path}"2⤵PID:1552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5049fbf55d8b457a3489c905eea89ca98
SHA18014031ecc7854fe6f76f5f016bffb2f297879f7
SHA2568299820c74274f9e5f8631f2e4e01512b96a2a89ca2975a5ed4f6959a34a68b3
SHA51283c974013f9b0e26e446afd048b6ebb3f9e2a600d3660fd6b896cdd7ec97fef7a42bf65926f35c94f945ae7b105d64090b8a5de412a67038b31779ecd31ac6b8