Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-06-2022 04:26
Static task
static1
Behavioral task
behavioral1
Sample
1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe
Resource
win10v2004-20220414-en
General
-
Target
1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe
-
Size
1.2MB
-
MD5
2475fda58a0ac4c571deb76001a6d81d
-
SHA1
f1a74f6500a64bcc2ae2a5c15d59bd96f43dd115
-
SHA256
1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7
-
SHA512
65e9e5d482ed5d4d68284756639265a7802f455238f9e750175ba43b5f9ba404122cc840c10da94c9416a6c4bd2ecb1da8722ba456a6bca5365bd4d9c659f940
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2916 svhost.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe File opened for modification C:\Windows\assembly\Desktop.ini 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1528 set thread context of 2916 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 87 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe File created C:\Windows\assembly\Desktop.ini 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe File opened for modification C:\Windows\assembly\Desktop.ini 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1528 wrote to memory of 1764 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 84 PID 1528 wrote to memory of 1764 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 84 PID 1528 wrote to memory of 1764 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 84 PID 1764 wrote to memory of 1936 1764 cmd.exe 86 PID 1764 wrote to memory of 1936 1764 cmd.exe 86 PID 1764 wrote to memory of 1936 1764 cmd.exe 86 PID 1528 wrote to memory of 2916 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 87 PID 1528 wrote to memory of 2916 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 87 PID 1528 wrote to memory of 2916 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 87 PID 1528 wrote to memory of 2916 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 87 PID 1528 wrote to memory of 2916 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 87 PID 1528 wrote to memory of 2916 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 87 PID 1528 wrote to memory of 2916 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 87 PID 1528 wrote to memory of 2916 1528 1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe"C:\Users\Admin\AppData\Local\Temp\1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\MATERIAL DRAWING.exe.lnk" /f3⤵PID:1936
-
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵
- Executes dropped EXE
PID:2916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD52475fda58a0ac4c571deb76001a6d81d
SHA1f1a74f6500a64bcc2ae2a5c15d59bd96f43dd115
SHA2561a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7
SHA51265e9e5d482ed5d4d68284756639265a7802f455238f9e750175ba43b5f9ba404122cc840c10da94c9416a6c4bd2ecb1da8722ba456a6bca5365bd4d9c659f940
-
Filesize
89KB
MD584c42d0f2c1ae761bef884638bc1eacd
SHA14353881e7f4e9c7610f4e0489183b55bb58bb574
SHA256331487446653875bf1e628b797a5283e40056654f7ff328eafbe39b0304480d3
SHA51243c307a38faa3a4b311597034cf75035a4434a1024d2a54e867e6a94b53b677898d71a858438d119000e872a7a6e92c5b31d277a8c207a94375ed4fd3c7beb87
-
Filesize
89KB
MD584c42d0f2c1ae761bef884638bc1eacd
SHA14353881e7f4e9c7610f4e0489183b55bb58bb574
SHA256331487446653875bf1e628b797a5283e40056654f7ff328eafbe39b0304480d3
SHA51243c307a38faa3a4b311597034cf75035a4434a1024d2a54e867e6a94b53b677898d71a858438d119000e872a7a6e92c5b31d277a8c207a94375ed4fd3c7beb87