Analysis
-
max time kernel
152s -
max time network
182s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04/06/2022, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe
Resource
win7-20220414-en
General
-
Target
0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe
-
Size
321KB
-
MD5
d174a4944559cc634b99c3d1bdc317c9
-
SHA1
425107c55d340e5057b2150813ecfbfbc4f1d79a
-
SHA256
0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63
-
SHA512
13357e9ddd76f86fdf4dd922d18a9a01daf89a0465faab00f056a76ee040a75344525ad49217cb47206b3218f5439d4b2213ba035c190ea08ef71670968d2519
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 584 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe -
Loads dropped DLL 2 IoCs
pid Process 912 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe 912 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 280 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 584 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 912 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe Token: SeDebugPrivilege 584 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe Token: 33 584 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe Token: SeIncBasePriorityPrivilege 584 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 584 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 912 wrote to memory of 584 912 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe 29 PID 912 wrote to memory of 584 912 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe 29 PID 912 wrote to memory of 584 912 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe 29 PID 912 wrote to memory of 584 912 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe 29 PID 912 wrote to memory of 1692 912 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe 30 PID 912 wrote to memory of 1692 912 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe 30 PID 912 wrote to memory of 1692 912 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe 30 PID 912 wrote to memory of 1692 912 0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe 30 PID 1692 wrote to memory of 280 1692 cmd.exe 32 PID 1692 wrote to memory of 280 1692 cmd.exe 32 PID 1692 wrote to memory of 280 1692 cmd.exe 32 PID 1692 wrote to memory of 280 1692 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe"C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe"C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:584
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:280
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe
Filesize321KB
MD5d174a4944559cc634b99c3d1bdc317c9
SHA1425107c55d340e5057b2150813ecfbfbc4f1d79a
SHA2560ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63
SHA51213357e9ddd76f86fdf4dd922d18a9a01daf89a0465faab00f056a76ee040a75344525ad49217cb47206b3218f5439d4b2213ba035c190ea08ef71670968d2519
-
C:\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe
Filesize321KB
MD5d174a4944559cc634b99c3d1bdc317c9
SHA1425107c55d340e5057b2150813ecfbfbc4f1d79a
SHA2560ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63
SHA51213357e9ddd76f86fdf4dd922d18a9a01daf89a0465faab00f056a76ee040a75344525ad49217cb47206b3218f5439d4b2213ba035c190ea08ef71670968d2519
-
\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe
Filesize321KB
MD5d174a4944559cc634b99c3d1bdc317c9
SHA1425107c55d340e5057b2150813ecfbfbc4f1d79a
SHA2560ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63
SHA51213357e9ddd76f86fdf4dd922d18a9a01daf89a0465faab00f056a76ee040a75344525ad49217cb47206b3218f5439d4b2213ba035c190ea08ef71670968d2519
-
\Users\Admin\AppData\Local\Temp\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63\0ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63.exe
Filesize321KB
MD5d174a4944559cc634b99c3d1bdc317c9
SHA1425107c55d340e5057b2150813ecfbfbc4f1d79a
SHA2560ff8298fb3d33364c77c59fe12d1afa40fb7c370aeabe96ea18979ee9f370b63
SHA51213357e9ddd76f86fdf4dd922d18a9a01daf89a0465faab00f056a76ee040a75344525ad49217cb47206b3218f5439d4b2213ba035c190ea08ef71670968d2519