Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-05-2022 05:26
Static task
static1
Behavioral task
behavioral1
Sample
0af412e0143612421adb293c6001cbb2c1bb45b7b076b897e582757c0c199e41.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0af412e0143612421adb293c6001cbb2c1bb45b7b076b897e582757c0c199e41.exe
Resource
win10v2004-20220414-en
General
-
Target
0af412e0143612421adb293c6001cbb2c1bb45b7b076b897e582757c0c199e41.exe
-
Size
234KB
-
MD5
28713700cc4cf8795a8766fe420e4696
-
SHA1
d56b0cef59368a5753c43037ca6cc9e4b33b11a7
-
SHA256
0af412e0143612421adb293c6001cbb2c1bb45b7b076b897e582757c0c199e41
-
SHA512
5b9fe21edecc4d23fee40fe05b4566bf17a341af6c0f63f5f62afbd1b6d71b9ab9bf2e0b34248c9a3e90f117fa0cc19d32cadb70bcb7cbb3324c0e07f8fbbd74
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 5 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 620 icacls.exe 1028 icacls.exe 644 icacls.exe 516 icacls.exe 784 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 1004 taskkill.exe 1608 taskkill.exe 944 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1004 taskkill.exe Token: SeDebugPrivilege 1608 taskkill.exe Token: SeDebugPrivilege 944 taskkill.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
0af412e0143612421adb293c6001cbb2c1bb45b7b076b897e582757c0c199e41.execmd.exedescription pid process target process PID 1096 wrote to memory of 1268 1096 0af412e0143612421adb293c6001cbb2c1bb45b7b076b897e582757c0c199e41.exe cmd.exe PID 1096 wrote to memory of 1268 1096 0af412e0143612421adb293c6001cbb2c1bb45b7b076b897e582757c0c199e41.exe cmd.exe PID 1096 wrote to memory of 1268 1096 0af412e0143612421adb293c6001cbb2c1bb45b7b076b897e582757c0c199e41.exe cmd.exe PID 1268 wrote to memory of 1004 1268 cmd.exe taskkill.exe PID 1268 wrote to memory of 1004 1268 cmd.exe taskkill.exe PID 1268 wrote to memory of 1004 1268 cmd.exe taskkill.exe PID 1268 wrote to memory of 1608 1268 cmd.exe taskkill.exe PID 1268 wrote to memory of 1608 1268 cmd.exe taskkill.exe PID 1268 wrote to memory of 1608 1268 cmd.exe taskkill.exe PID 1268 wrote to memory of 944 1268 cmd.exe taskkill.exe PID 1268 wrote to memory of 944 1268 cmd.exe taskkill.exe PID 1268 wrote to memory of 944 1268 cmd.exe taskkill.exe PID 1268 wrote to memory of 268 1268 cmd.exe attrib.exe PID 1268 wrote to memory of 268 1268 cmd.exe attrib.exe PID 1268 wrote to memory of 268 1268 cmd.exe attrib.exe PID 1268 wrote to memory of 516 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 516 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 516 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 784 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 784 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 784 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 620 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 620 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 620 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 1028 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 1028 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 1028 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 644 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 644 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 644 1268 cmd.exe icacls.exe PID 1268 wrote to memory of 1772 1268 cmd.exe reg.exe PID 1268 wrote to memory of 1772 1268 cmd.exe reg.exe PID 1268 wrote to memory of 1772 1268 cmd.exe reg.exe PID 1268 wrote to memory of 1804 1268 cmd.exe reg.exe PID 1268 wrote to memory of 1804 1268 cmd.exe reg.exe PID 1268 wrote to memory of 1804 1268 cmd.exe reg.exe PID 1268 wrote to memory of 1048 1268 cmd.exe reg.exe PID 1268 wrote to memory of 1048 1268 cmd.exe reg.exe PID 1268 wrote to memory of 1048 1268 cmd.exe reg.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\0af412e0143612421adb293c6001cbb2c1bb45b7b076b897e582757c0c199e41.exe"C:\Users\Admin\AppData\Local\Temp\0af412e0143612421adb293c6001cbb2c1bb45b7b076b897e582757c0c199e41.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\ECD0.tmp\ECD1.tmp\ECD2.bat C:\Users\Admin\AppData\Local\Temp\0af412e0143612421adb293c6001cbb2c1bb45b7b076b897e582757c0c199e41.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /IM WimSCP.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /IM ATKPrwCtrl.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /IM Aupuf.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\attrib.exeattrib "C:\ProgramData\AMDControlPanelClient" -s -h -r /S /D3⤵
- Views/modifies file attributes
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\AMDControlPanelClient" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\AMDControlPanelClient" /inheritance:e /grant "SYSTEM:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\AMDControlPanelClient" /inheritance:e /grant "Administrators:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\AMDControlPanelClient" /inheritance:e /grant "Users:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\AMDControlPanelClient" /inheritance:e /grant "Admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\reg.exeREG DELETE HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v AMD GPU Optimization /F3⤵
-
C:\Windows\system32\reg.exeREG DELETE HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v AMD GPU Optimization /F3⤵
-
C:\Windows\system32\reg.exeREG DELETE HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v AMD GPU Optimization /F3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ECD0.tmp\ECD1.tmp\ECD2.batFilesize
1KB
MD557933d14dbc025036b72e4c8516a7ce1
SHA1b6403e5d4c55cfc168027a33aeddf04d30f3ba47
SHA256e23229afdf11d0708fa6ebd9c4c28fab1d0a59d3894e51c4c668064de55a1b45
SHA512dcd226f0666fd6566216318b85b505222760355509c962f0dbdc3e5b3c3e10bc57eb44d42ead647a74d08c3043662e180010fd0acb3dc7a4ae32afaf94d80ad3
-
memory/268-60-0x0000000000000000-mapping.dmp
-
memory/516-61-0x0000000000000000-mapping.dmp
-
memory/620-63-0x0000000000000000-mapping.dmp
-
memory/644-65-0x0000000000000000-mapping.dmp
-
memory/784-62-0x0000000000000000-mapping.dmp
-
memory/944-59-0x0000000000000000-mapping.dmp
-
memory/1004-57-0x0000000000000000-mapping.dmp
-
memory/1028-64-0x0000000000000000-mapping.dmp
-
memory/1048-68-0x0000000000000000-mapping.dmp
-
memory/1096-54-0x000007FEFBEB1000-0x000007FEFBEB3000-memory.dmpFilesize
8KB
-
memory/1268-55-0x0000000000000000-mapping.dmp
-
memory/1608-58-0x0000000000000000-mapping.dmp
-
memory/1772-66-0x0000000000000000-mapping.dmp
-
memory/1804-67-0x0000000000000000-mapping.dmp