Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09/06/2022, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe
Resource
win10v2004-20220414-en
General
-
Target
3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe
-
Size
644KB
-
MD5
2d52f51831bb09c03ef6d4237df554f3
-
SHA1
2b96a3092e7a44b0af213adb78ce9d38ba8e4df4
-
SHA256
3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7
-
SHA512
84324a5bf5ce001ec71ff22111fd7aa8f29dd01163a6f5f0ad242149cb21a1d64a91a70b2de7a7c2d0dc974882088b95f8c66134208bc572200c0b1bea767790
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1600 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe -
Deletes itself 1 IoCs
pid Process 1628 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2012 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 1600 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1008 set thread context of 2012 1008 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1500 PING.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1008 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe Token: SeDebugPrivilege 2012 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe Token: SeDebugPrivilege 1600 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1008 wrote to memory of 2012 1008 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 28 PID 1008 wrote to memory of 2012 1008 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 28 PID 1008 wrote to memory of 2012 1008 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 28 PID 1008 wrote to memory of 2012 1008 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 28 PID 1008 wrote to memory of 2012 1008 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 28 PID 1008 wrote to memory of 2012 1008 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 28 PID 1008 wrote to memory of 2012 1008 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 28 PID 1008 wrote to memory of 2012 1008 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 28 PID 1008 wrote to memory of 2012 1008 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 28 PID 2012 wrote to memory of 1600 2012 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 30 PID 2012 wrote to memory of 1600 2012 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 30 PID 2012 wrote to memory of 1600 2012 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 30 PID 2012 wrote to memory of 1600 2012 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 30 PID 2012 wrote to memory of 1628 2012 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 31 PID 2012 wrote to memory of 1628 2012 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 31 PID 2012 wrote to memory of 1628 2012 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 31 PID 2012 wrote to memory of 1628 2012 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 31 PID 1628 wrote to memory of 1500 1628 cmd.exe 33 PID 1628 wrote to memory of 1500 1628 cmd.exe 33 PID 1628 wrote to memory of 1500 1628 cmd.exe 33 PID 1628 wrote to memory of 1500 1628 cmd.exe 33 PID 1600 wrote to memory of 1548 1600 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 34 PID 1600 wrote to memory of 1548 1600 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 34 PID 1600 wrote to memory of 1548 1600 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 34 PID 1600 wrote to memory of 1548 1600 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 34 PID 1600 wrote to memory of 1548 1600 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 34 PID 1600 wrote to memory of 1548 1600 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 34 PID 1600 wrote to memory of 1548 1600 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 34 PID 1600 wrote to memory of 1548 1600 3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe"C:\Users\Admin\AppData\Local\Temp\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe"C:\Users\Admin\AppData\Local\Temp\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe"C:\Users\Admin\AppData\Local\Temp\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe"C:\Users\Admin\AppData\Local\Temp\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe"4⤵PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:1500
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe
Filesize644KB
MD52d52f51831bb09c03ef6d4237df554f3
SHA12b96a3092e7a44b0af213adb78ce9d38ba8e4df4
SHA2563e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7
SHA51284324a5bf5ce001ec71ff22111fd7aa8f29dd01163a6f5f0ad242149cb21a1d64a91a70b2de7a7c2d0dc974882088b95f8c66134208bc572200c0b1bea767790
-
C:\Users\Admin\AppData\Local\Temp\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe
Filesize644KB
MD52d52f51831bb09c03ef6d4237df554f3
SHA12b96a3092e7a44b0af213adb78ce9d38ba8e4df4
SHA2563e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7
SHA51284324a5bf5ce001ec71ff22111fd7aa8f29dd01163a6f5f0ad242149cb21a1d64a91a70b2de7a7c2d0dc974882088b95f8c66134208bc572200c0b1bea767790
-
\Users\Admin\AppData\Local\Temp\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe
Filesize644KB
MD52d52f51831bb09c03ef6d4237df554f3
SHA12b96a3092e7a44b0af213adb78ce9d38ba8e4df4
SHA2563e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7
SHA51284324a5bf5ce001ec71ff22111fd7aa8f29dd01163a6f5f0ad242149cb21a1d64a91a70b2de7a7c2d0dc974882088b95f8c66134208bc572200c0b1bea767790
-
\Users\Admin\AppData\Local\Temp\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7\3e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7.exe
Filesize644KB
MD52d52f51831bb09c03ef6d4237df554f3
SHA12b96a3092e7a44b0af213adb78ce9d38ba8e4df4
SHA2563e466f7e99f42aea17a56cebb60bbb17eb2e8fbb8e779b5b076d81a2717a92c7
SHA51284324a5bf5ce001ec71ff22111fd7aa8f29dd01163a6f5f0ad242149cb21a1d64a91a70b2de7a7c2d0dc974882088b95f8c66134208bc572200c0b1bea767790