Analysis
-
max time kernel
83s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 15:49
Static task
static1
Behavioral task
behavioral1
Sample
e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0.exe
Resource
win7-20220414-en
General
-
Target
e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0.exe
-
Size
411KB
-
MD5
2adea70fccf261c8c99d87be94dff75b
-
SHA1
ec8fb48c9a4fb3dbd227c1049f08c00e0b4a1623
-
SHA256
e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0
-
SHA512
286b11acb1e1becafce0fc26bed6eeaa9f05e33c64dd7d36a3ddb3b7706ca8144fcb0d7d18c753ec05e693ac2767631b62bddd89bd04cd482961964499677487
Malware Config
Signatures
-
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Executes dropped EXE 3 IoCs
Processes:
Audio Service.exeAudio Service.exeAudio Service.exepid process 2028 Audio Service.exe 840 Audio Service.exe 1288 Audio Service.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Services\Audio Service.exe upx \Users\Admin\AppData\Roaming\Services\Audio Service.exe upx \Users\Admin\AppData\Roaming\Services\Audio Service.exe upx \Users\Admin\AppData\Roaming\Services\Audio Service.exe upx C:\Users\Admin\AppData\Roaming\Services\Audio Service.exe upx \Users\Admin\AppData\Roaming\Services\Audio Service.exe upx -
Drops startup file 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Audio Service.vbs notepad.exe -
Loads dropped DLL 4 IoCs
Processes:
notepad.exeAudio Service.exepid process 1948 notepad.exe 1948 notepad.exe 2028 Audio Service.exe 2028 Audio Service.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Audio Service.exedescription pid process target process PID 2028 set thread context of 840 2028 Audio Service.exe Audio Service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1860 840 WerFault.exe Audio Service.exe -
NTFS ADS 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Services\Audio Service.exe:ZoneIdentifier notepad.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0.exeAudio Service.exeAudio Service.exepid process 800 e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0.exe 2028 Audio Service.exe 1288 Audio Service.exe 1288 Audio Service.exe 1288 Audio Service.exe 1288 Audio Service.exe 1288 Audio Service.exe 1288 Audio Service.exe 1288 Audio Service.exe 1288 Audio Service.exe 1288 Audio Service.exe 1288 Audio Service.exe 1288 Audio Service.exe 1288 Audio Service.exe 1288 Audio Service.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Audio Service.exepid process 2028 Audio Service.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Audio Service.exedescription pid process Token: SeDebugPrivilege 840 Audio Service.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Audio Service.exepid process 840 Audio Service.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0.exenotepad.exeAudio Service.exedescription pid process target process PID 800 wrote to memory of 1948 800 e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0.exe notepad.exe PID 800 wrote to memory of 1948 800 e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0.exe notepad.exe PID 800 wrote to memory of 1948 800 e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0.exe notepad.exe PID 800 wrote to memory of 1948 800 e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0.exe notepad.exe PID 800 wrote to memory of 1948 800 e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0.exe notepad.exe PID 800 wrote to memory of 1948 800 e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0.exe notepad.exe PID 1948 wrote to memory of 2028 1948 notepad.exe Audio Service.exe PID 1948 wrote to memory of 2028 1948 notepad.exe Audio Service.exe PID 1948 wrote to memory of 2028 1948 notepad.exe Audio Service.exe PID 1948 wrote to memory of 2028 1948 notepad.exe Audio Service.exe PID 2028 wrote to memory of 840 2028 Audio Service.exe Audio Service.exe PID 2028 wrote to memory of 840 2028 Audio Service.exe Audio Service.exe PID 2028 wrote to memory of 840 2028 Audio Service.exe Audio Service.exe PID 2028 wrote to memory of 840 2028 Audio Service.exe Audio Service.exe PID 2028 wrote to memory of 1288 2028 Audio Service.exe Audio Service.exe PID 2028 wrote to memory of 1288 2028 Audio Service.exe Audio Service.exe PID 2028 wrote to memory of 1288 2028 Audio Service.exe Audio Service.exe PID 2028 wrote to memory of 1288 2028 Audio Service.exe Audio Service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0.exe"C:\Users\Admin\AppData\Local\Temp\e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Services\Audio Service.exe"C:\Users\Admin\AppData\Roaming\Services\Audio Service.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Services\Audio Service.exe"C:\Users\Admin\AppData\Roaming\Services\Audio Service.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 15085⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\R2WDgGXE3c30.bat" "5⤵
-
C:\Users\Admin\AppData\Roaming\Services\Audio Service.exe"C:\Users\Admin\AppData\Roaming\Services\Audio Service.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\Services\Audio Service.exe"C:\Users\Admin\AppData\Roaming\Services\Audio Service.exe" 2 840 71717244⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost1⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\chcp.comchcp 650011⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\R2WDgGXE3c30.bat
-
C:\Users\Admin\AppData\Roaming\Services\Audio Service.exeFilesize
17KB
MD5d64ada5cbb36654228f2467755dd9446
SHA1e77a8b0bdd234976a5cd401b9f048e3da8795f49
SHA2563a2dc9ae9a1c05beba66d5f6f4bac56ff762f84d0683baaa6c0e4a646ae0adfa
SHA512ff8d17087d19dcafd6d0c311f7b1f1a8654acc5c3a58d08a6d36374522980a2d4ffc72c17240ce8bde647520632fd90b2dd7fade89306da4e8893e86a60bf67f
-
C:\Users\Admin\AppData\Roaming\Services\Audio Service.exeFilesize
382KB
MD5b6c4c015f499d462e67ac44473bd98ab
SHA1b4740a0579c7e1a1d6624afd638d05613f690814
SHA2565fc95537b812d648f32d035224f9ad228cb2c40b53ea97df42e011ba2fe01bd3
SHA512c1829cbbc1a2e3c03ba7a87855039a3b7137c2d111d85d0b3798508d405db390b5ee040f5d89f70aad6244669f13f6e46f39ec5ad90cde7416e3cf0c7104dc15
-
C:\Users\Admin\AppData\Roaming\Services\Audio Service.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Services\Audio Service.exe
-
C:\Users\Admin\AppData\Roaming\Services\Audio Service.exe
-
\Users\Admin\AppData\Roaming\Services\Audio Service.exeFilesize
55KB
MD5cd6e7d5e4135ffcbea970c2fac8cf6e7
SHA1c882e213fcba7c626af1c83690a1d03367bac6ed
SHA2568ddad306a293cb4725b9ba378d14ce6bc866cfc8e3ad5975fdaa6de755388954
SHA5123b438b6c55483907c23562abdc49f256cd05be64caaa5c10f6f399828127cd54c9dbf90ba60f4cc020bd1c9dd914cdc713fb7177c5d382bb209fad47bc44c604
-
\Users\Admin\AppData\Roaming\Services\Audio Service.exeFilesize
30KB
MD56c99a5c3ecceb9ff2beba90b377c9d83
SHA1defdc7a4f63447f4713f41278919809688d65a93
SHA256479caa0830631b62f38881fa8eff460329463d1721d7ba1ee35565a83d1b749e
SHA512ab9c6c0da5a3e4f543ef576707f8bca24616f7049886cdfd7a05ef36d6a18d160468e0e24aa9bdf74f0c49122ec823338fd825a0f0c275733ab209a0ce3d7c41
-
\Users\Admin\AppData\Roaming\Services\Audio Service.exeFilesize
411KB
MD52adea70fccf261c8c99d87be94dff75b
SHA1ec8fb48c9a4fb3dbd227c1049f08c00e0b4a1623
SHA256e22cce54e5bca8dbef485c6ab22fc9e3fa38b7315691cd902efb522ad8011ba0
SHA512286b11acb1e1becafce0fc26bed6eeaa9f05e33c64dd7d36a3ddb3b7706ca8144fcb0d7d18c753ec05e693ac2767631b62bddd89bd04cd482961964499677487
-
\Users\Admin\AppData\Roaming\Services\Audio Service.exeFilesize
92KB
MD504f7fdbcc07c025a2b57b4717e8a67a1
SHA1cb9bd142f4ab1e7a3c66584a7530c00151b42d0d
SHA2562b6132a1870712df28d127ef1b0f914723339cb000f827e93fad74f3f83c4a43
SHA512cb3242de708c044ca6cf80e88a5d3878bdfab4fa85b7b733dca700ff6c0f2a3b4209efd04a4c0160e9d8bd4073587ead877e0488522e49b712d4cb5b717ca15f
-
\Users\Admin\AppData\Roaming\Services\Audio Service.exe
-
\Users\Admin\AppData\Roaming\Services\Audio Service.exe
-
\Users\Admin\AppData\Roaming\Services\Audio Service.exe
-
\Users\Admin\AppData\Roaming\Services\Audio Service.exe
-
\Users\Admin\AppData\Roaming\Services\Audio Service.exe
-
\Users\Admin\AppData\Roaming\Services\Audio Service.exe
-
\Users\Admin\AppData\Roaming\Services\Audio Service.exe
-
memory/516-86-0x0000000000000000-mapping.dmp
-
memory/800-54-0x00000000765F1000-0x00000000765F3000-memory.dmpFilesize
8KB
-
memory/800-55-0x0000000000260000-0x000000000026E000-memory.dmpFilesize
56KB
-
memory/840-70-0x0000000000380000-0x00000000003CE000-memory.dmpFilesize
312KB
-
memory/840-65-0x00000000004A7500-mapping.dmp
-
memory/840-69-0x0000000000380000-0x00000000003CE000-memory.dmpFilesize
312KB
-
memory/1272-77-0x0000000000000000-mapping.dmp
-
memory/1288-68-0x0000000000000000-mapping.dmp
-
memory/1644-74-0x0000000000000000-mapping.dmp
-
memory/1860-76-0x0000000000000000-mapping.dmp
-
memory/1948-56-0x0000000000000000-mapping.dmp
-
memory/1992-82-0x0000000000000000-mapping.dmp
-
memory/2028-60-0x0000000000000000-mapping.dmp