Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-06-2022 19:53
Static task
static1
Behavioral task
behavioral1
Sample
1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe
Resource
win10v2004-20220414-en
General
-
Target
1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe
-
Size
320KB
-
MD5
625a017a6371a14f0dd7ba614d87bba3
-
SHA1
496d24aa0294e28b36932c5b98c71b95b2103c04
-
SHA256
1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143
-
SHA512
ddac55dd167f0238390601fe477a754ce95ec16457dabc266f261e50c98235098bbcebd29b5fa550a00cae1446a0bcf406571899796b97b495efed3c3eb6daef
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\M-484673406347063748640\winmgr.exe = "C:\\Users\\Admin\\M-484673406347063748640\\winmgr.exe:*:Enabled:Microsoft Windows Service" 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe -
Executes dropped EXE 2 IoCs
pid Process 1988 winmgr.exe 940 winmgr.exe -
resource yara_rule behavioral1/memory/1964-66-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/files/0x000a000000012323-70.dat upx behavioral1/files/0x000a000000012323-72.dat upx behavioral1/files/0x000a000000012323-74.dat upx behavioral1/files/0x000a000000012323-85.dat upx behavioral1/memory/1988-87-0x0000000000400000-0x00000000004B4000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1944 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Service = "C:\\Users\\Admin\\M-484673406347063748640\\winmgr.exe" 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1964-66-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/1988-87-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1964 set thread context of 1944 1964 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 27 PID 1988 set thread context of 940 1988 winmgr.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1944 1964 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 27 PID 1964 wrote to memory of 1944 1964 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 27 PID 1964 wrote to memory of 1944 1964 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 27 PID 1964 wrote to memory of 1944 1964 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 27 PID 1964 wrote to memory of 1944 1964 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 27 PID 1964 wrote to memory of 1944 1964 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 27 PID 1964 wrote to memory of 1944 1964 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 27 PID 1964 wrote to memory of 1944 1964 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 27 PID 1964 wrote to memory of 1944 1964 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 27 PID 1964 wrote to memory of 1944 1964 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 27 PID 1964 wrote to memory of 1944 1964 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 27 PID 1944 wrote to memory of 1988 1944 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 28 PID 1944 wrote to memory of 1988 1944 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 28 PID 1944 wrote to memory of 1988 1944 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 28 PID 1944 wrote to memory of 1988 1944 1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe 28 PID 1988 wrote to memory of 940 1988 winmgr.exe 29 PID 1988 wrote to memory of 940 1988 winmgr.exe 29 PID 1988 wrote to memory of 940 1988 winmgr.exe 29 PID 1988 wrote to memory of 940 1988 winmgr.exe 29 PID 1988 wrote to memory of 940 1988 winmgr.exe 29 PID 1988 wrote to memory of 940 1988 winmgr.exe 29 PID 1988 wrote to memory of 940 1988 winmgr.exe 29 PID 1988 wrote to memory of 940 1988 winmgr.exe 29 PID 1988 wrote to memory of 940 1988 winmgr.exe 29 PID 1988 wrote to memory of 940 1988 winmgr.exe 29 PID 1988 wrote to memory of 940 1988 winmgr.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe"C:\Users\Admin\AppData\Local\Temp\1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe"C:\Users\Admin\AppData\Local\Temp\1b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\M-484673406347063748640\winmgr.exe"C:\Users\Admin\M-484673406347063748640\winmgr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\M-484673406347063748640\winmgr.exe"C:\Users\Admin\M-484673406347063748640\winmgr.exe"4⤵
- Executes dropped EXE
PID:940
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5625a017a6371a14f0dd7ba614d87bba3
SHA1496d24aa0294e28b36932c5b98c71b95b2103c04
SHA2561b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143
SHA512ddac55dd167f0238390601fe477a754ce95ec16457dabc266f261e50c98235098bbcebd29b5fa550a00cae1446a0bcf406571899796b97b495efed3c3eb6daef
-
Filesize
320KB
MD5625a017a6371a14f0dd7ba614d87bba3
SHA1496d24aa0294e28b36932c5b98c71b95b2103c04
SHA2561b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143
SHA512ddac55dd167f0238390601fe477a754ce95ec16457dabc266f261e50c98235098bbcebd29b5fa550a00cae1446a0bcf406571899796b97b495efed3c3eb6daef
-
Filesize
320KB
MD5625a017a6371a14f0dd7ba614d87bba3
SHA1496d24aa0294e28b36932c5b98c71b95b2103c04
SHA2561b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143
SHA512ddac55dd167f0238390601fe477a754ce95ec16457dabc266f261e50c98235098bbcebd29b5fa550a00cae1446a0bcf406571899796b97b495efed3c3eb6daef
-
Filesize
320KB
MD5625a017a6371a14f0dd7ba614d87bba3
SHA1496d24aa0294e28b36932c5b98c71b95b2103c04
SHA2561b13b7a8c8fe3c31010f803e1125501119059fff0ba84176ae0290863e51c143
SHA512ddac55dd167f0238390601fe477a754ce95ec16457dabc266f261e50c98235098bbcebd29b5fa550a00cae1446a0bcf406571899796b97b495efed3c3eb6daef