Analysis
-
max time kernel
37s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 23:43
Static task
static1
Behavioral task
behavioral1
Sample
99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exe
Resource
win10v2004-20220414-en
General
-
Target
99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exe
-
Size
3.9MB
-
MD5
df2de903ee38ab89ce424656ec5e85e4
-
SHA1
4a4417e38ce7a8a098c3f09e318783fd5821e8ee
-
SHA256
99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364
-
SHA512
9ffd0259e14b9685b362adb28c0f147a47dc920e3691e7163ce9c38be00f717d99b29c9918ca339f300761d06edf9b88ddc6f33ec83bc009e32a1543224a2a38
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
Alex.exepid process 280 Alex.exe -
Loads dropped DLL 5 IoCs
Processes:
99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exeAlex.exepid process 1280 99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exe 1280 99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exe 1280 99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exe 1280 99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exe 280 Alex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1632 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1632 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exeAlex.execmd.exedescription pid process target process PID 1280 wrote to memory of 280 1280 99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exe Alex.exe PID 1280 wrote to memory of 280 1280 99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exe Alex.exe PID 1280 wrote to memory of 280 1280 99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exe Alex.exe PID 1280 wrote to memory of 280 1280 99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exe Alex.exe PID 280 wrote to memory of 1448 280 Alex.exe cmd.exe PID 280 wrote to memory of 1448 280 Alex.exe cmd.exe PID 280 wrote to memory of 1448 280 Alex.exe cmd.exe PID 280 wrote to memory of 1448 280 Alex.exe cmd.exe PID 1448 wrote to memory of 1632 1448 cmd.exe taskkill.exe PID 1448 wrote to memory of 1632 1448 cmd.exe taskkill.exe PID 1448 wrote to memory of 1632 1448 cmd.exe taskkill.exe PID 1448 wrote to memory of 1632 1448 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exe"C:\Users\Admin\AppData\Local\Temp\99ea2034d76477e11983afe0aee3d54f871a926918ca4e766e5b0df5f5254364.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Alex.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Alex.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "TASKKILL /F /IM explorer.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exeTASKKILL /F /IM explorer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Alex.exeFilesize
2.7MB
MD5fe7f4b6bfe992e2e484ee57844c3d9f4
SHA1778105f9db1966fd7e3a296fac5bbb93bc2bea24
SHA256f2c8c8b9b3e29602c4d776fa471c7f6a26f72a19ab07da3646fa339cb32b1fec
SHA51263d0211d27bf264f4e98ec098a900ea97351b023d23985961143f9363800557e7aafa98c801094a425b23282005bc6e9e36d4cb4773474d7b103ade6494f1d79
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Alex.exeFilesize
2.7MB
MD5fe7f4b6bfe992e2e484ee57844c3d9f4
SHA1778105f9db1966fd7e3a296fac5bbb93bc2bea24
SHA256f2c8c8b9b3e29602c4d776fa471c7f6a26f72a19ab07da3646fa339cb32b1fec
SHA51263d0211d27bf264f4e98ec098a900ea97351b023d23985961143f9363800557e7aafa98c801094a425b23282005bc6e9e36d4cb4773474d7b103ade6494f1d79
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\php5ts.dllFilesize
6.5MB
MD5c9aff68f6673fae7580527e8c76805b6
SHA1bb62cc1db82cfe07a8c08a36446569dfc9c76d10
SHA2569b2c8b8c4cec301c4303f58ca4e8b261d516f10feb24573b092dfccc263baea4
SHA512c7836f46e535046562046fdd8d3264cd712a78c0f41eab152c88ea91b17d34f000e2387ded7e9e7b3410332354aabf8ca7d37729eb68e46ab5ce58936e63ac56
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Alex.exeFilesize
2.7MB
MD5fe7f4b6bfe992e2e484ee57844c3d9f4
SHA1778105f9db1966fd7e3a296fac5bbb93bc2bea24
SHA256f2c8c8b9b3e29602c4d776fa471c7f6a26f72a19ab07da3646fa339cb32b1fec
SHA51263d0211d27bf264f4e98ec098a900ea97351b023d23985961143f9363800557e7aafa98c801094a425b23282005bc6e9e36d4cb4773474d7b103ade6494f1d79
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Alex.exeFilesize
2.7MB
MD5fe7f4b6bfe992e2e484ee57844c3d9f4
SHA1778105f9db1966fd7e3a296fac5bbb93bc2bea24
SHA256f2c8c8b9b3e29602c4d776fa471c7f6a26f72a19ab07da3646fa339cb32b1fec
SHA51263d0211d27bf264f4e98ec098a900ea97351b023d23985961143f9363800557e7aafa98c801094a425b23282005bc6e9e36d4cb4773474d7b103ade6494f1d79
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Alex.exeFilesize
2.7MB
MD5fe7f4b6bfe992e2e484ee57844c3d9f4
SHA1778105f9db1966fd7e3a296fac5bbb93bc2bea24
SHA256f2c8c8b9b3e29602c4d776fa471c7f6a26f72a19ab07da3646fa339cb32b1fec
SHA51263d0211d27bf264f4e98ec098a900ea97351b023d23985961143f9363800557e7aafa98c801094a425b23282005bc6e9e36d4cb4773474d7b103ade6494f1d79
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Alex.exeFilesize
2.7MB
MD5fe7f4b6bfe992e2e484ee57844c3d9f4
SHA1778105f9db1966fd7e3a296fac5bbb93bc2bea24
SHA256f2c8c8b9b3e29602c4d776fa471c7f6a26f72a19ab07da3646fa339cb32b1fec
SHA51263d0211d27bf264f4e98ec098a900ea97351b023d23985961143f9363800557e7aafa98c801094a425b23282005bc6e9e36d4cb4773474d7b103ade6494f1d79
-
\Users\Admin\AppData\Local\Temp\RarSFX0\php5ts.dllFilesize
6.5MB
MD5c9aff68f6673fae7580527e8c76805b6
SHA1bb62cc1db82cfe07a8c08a36446569dfc9c76d10
SHA2569b2c8b8c4cec301c4303f58ca4e8b261d516f10feb24573b092dfccc263baea4
SHA512c7836f46e535046562046fdd8d3264cd712a78c0f41eab152c88ea91b17d34f000e2387ded7e9e7b3410332354aabf8ca7d37729eb68e46ab5ce58936e63ac56
-
memory/280-59-0x0000000000000000-mapping.dmp
-
memory/1280-54-0x00000000756E1000-0x00000000756E3000-memory.dmpFilesize
8KB
-
memory/1448-65-0x0000000000000000-mapping.dmp
-
memory/1632-66-0x0000000000000000-mapping.dmp