Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09/06/2022, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe
Resource
win10v2004-20220414-en
General
-
Target
690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe
-
Size
699KB
-
MD5
519ece9d56d4475f0b1287c0d22ebfc2
-
SHA1
58c99f6ef9f87f2f3cb2f807abf4db2dcfaf2d27
-
SHA256
690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e
-
SHA512
067ba9b3646f3098a9cc923c004bac20bf551902309858a1160409938cdf27d84e29dc27cda8bf0556988dcc6c950ba532ec6e34471f5908574ab4740d206399
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 812 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 836 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe -
Loads dropped DLL 2 IoCs
pid Process 1736 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 812 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\winstartcdb = "C:\\Users\\Admin\\AppData\\Roaming\\defenderstcdb\\winlogimdecdb.exe" 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1980 set thread context of 1736 1980 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 27 PID 812 set thread context of 836 812 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1468 PING.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1980 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe Token: SeDebugPrivilege 1736 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe Token: SeDebugPrivilege 812 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe Token: SeDebugPrivilege 836 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe Token: 33 836 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe Token: SeIncBasePriorityPrivilege 836 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 836 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1736 1980 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 27 PID 1980 wrote to memory of 1736 1980 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 27 PID 1980 wrote to memory of 1736 1980 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 27 PID 1980 wrote to memory of 1736 1980 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 27 PID 1980 wrote to memory of 1736 1980 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 27 PID 1980 wrote to memory of 1736 1980 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 27 PID 1980 wrote to memory of 1736 1980 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 27 PID 1980 wrote to memory of 1736 1980 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 27 PID 1980 wrote to memory of 1736 1980 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 27 PID 1736 wrote to memory of 812 1736 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 29 PID 1736 wrote to memory of 812 1736 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 29 PID 1736 wrote to memory of 812 1736 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 29 PID 1736 wrote to memory of 812 1736 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 29 PID 1736 wrote to memory of 1692 1736 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 30 PID 1736 wrote to memory of 1692 1736 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 30 PID 1736 wrote to memory of 1692 1736 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 30 PID 1736 wrote to memory of 1692 1736 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 30 PID 1692 wrote to memory of 1468 1692 cmd.exe 32 PID 1692 wrote to memory of 1468 1692 cmd.exe 32 PID 1692 wrote to memory of 1468 1692 cmd.exe 32 PID 1692 wrote to memory of 1468 1692 cmd.exe 32 PID 812 wrote to memory of 836 812 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 33 PID 812 wrote to memory of 836 812 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 33 PID 812 wrote to memory of 836 812 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 33 PID 812 wrote to memory of 836 812 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 33 PID 812 wrote to memory of 836 812 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 33 PID 812 wrote to memory of 836 812 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 33 PID 812 wrote to memory of 836 812 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 33 PID 812 wrote to memory of 836 812 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 33 PID 812 wrote to memory of 836 812 690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe"C:\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe"C:\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe"C:\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe"C:\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:836
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:1468
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe
Filesize699KB
MD5519ece9d56d4475f0b1287c0d22ebfc2
SHA158c99f6ef9f87f2f3cb2f807abf4db2dcfaf2d27
SHA256690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e
SHA512067ba9b3646f3098a9cc923c004bac20bf551902309858a1160409938cdf27d84e29dc27cda8bf0556988dcc6c950ba532ec6e34471f5908574ab4740d206399
-
C:\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe
Filesize699KB
MD5519ece9d56d4475f0b1287c0d22ebfc2
SHA158c99f6ef9f87f2f3cb2f807abf4db2dcfaf2d27
SHA256690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e
SHA512067ba9b3646f3098a9cc923c004bac20bf551902309858a1160409938cdf27d84e29dc27cda8bf0556988dcc6c950ba532ec6e34471f5908574ab4740d206399
-
C:\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe
Filesize699KB
MD5519ece9d56d4475f0b1287c0d22ebfc2
SHA158c99f6ef9f87f2f3cb2f807abf4db2dcfaf2d27
SHA256690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e
SHA512067ba9b3646f3098a9cc923c004bac20bf551902309858a1160409938cdf27d84e29dc27cda8bf0556988dcc6c950ba532ec6e34471f5908574ab4740d206399
-
\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe
Filesize699KB
MD5519ece9d56d4475f0b1287c0d22ebfc2
SHA158c99f6ef9f87f2f3cb2f807abf4db2dcfaf2d27
SHA256690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e
SHA512067ba9b3646f3098a9cc923c004bac20bf551902309858a1160409938cdf27d84e29dc27cda8bf0556988dcc6c950ba532ec6e34471f5908574ab4740d206399
-
\Users\Admin\AppData\Local\Temp\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e\690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e.exe
Filesize699KB
MD5519ece9d56d4475f0b1287c0d22ebfc2
SHA158c99f6ef9f87f2f3cb2f807abf4db2dcfaf2d27
SHA256690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e
SHA512067ba9b3646f3098a9cc923c004bac20bf551902309858a1160409938cdf27d84e29dc27cda8bf0556988dcc6c950ba532ec6e34471f5908574ab4740d206399