Analysis
-
max time kernel
133s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
10-06-2022 15:37
Static task
static1
Behavioral task
behavioral1
Sample
1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe
Resource
win7-20220414-en
General
-
Target
1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe
-
Size
36KB
-
MD5
4f6d5d0ba1aa54880f1bcce5ed4858a4
-
SHA1
06d7f2150ebe20a6c3a0e65a46459b5fe2e9ceb2
-
SHA256
1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72
-
SHA512
fa78f6a16ded41d10bf5a09bfc849452b21e9f0b9d9fe29e9162811aae5912264bf117f30cf2dfd443fa073b925e999ba484ecb6f38b7d8a0f05d839ee40792f
Malware Config
Extracted
netdooka
http://93.115.21.45/gtaddress
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 2 IoCs
Processes:
min_id_resolver.exemin_id_resolver.exepid Process 288 min_id_resolver.exe 1948 min_id_resolver.exe -
Stops running service(s) 3 TTPs
-
Checks for any installed AV software in registry 1 TTPs 2 IoCs
Processes:
1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Avira 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe -
Drops file in Program Files directory 2 IoCs
Processes:
cmd.exedescription ioc Process File created C:\Program Files (x86)\ExMultimediaStorage\min_id_resolver.exe cmd.exe File opened for modification C:\Program Files (x86)\ExMultimediaStorage\min_id_resolver.exe cmd.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 1960 sc.exe 948 sc.exe 1720 sc.exe 1632 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
min_id_resolver.exemin_id_resolver.exedescription pid Process Token: SeDebugPrivilege 288 min_id_resolver.exe Token: SeDebugPrivilege 1948 min_id_resolver.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exedescription pid Process procid_target PID 884 wrote to memory of 1108 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 27 PID 884 wrote to memory of 1108 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 27 PID 884 wrote to memory of 1108 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 27 PID 884 wrote to memory of 1108 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 27 PID 884 wrote to memory of 1992 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 29 PID 884 wrote to memory of 1992 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 29 PID 884 wrote to memory of 1992 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 29 PID 884 wrote to memory of 1992 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 29 PID 884 wrote to memory of 948 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 31 PID 884 wrote to memory of 948 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 31 PID 884 wrote to memory of 948 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 31 PID 884 wrote to memory of 948 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 31 PID 884 wrote to memory of 1720 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 33 PID 884 wrote to memory of 1720 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 33 PID 884 wrote to memory of 1720 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 33 PID 884 wrote to memory of 1720 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 33 PID 884 wrote to memory of 1632 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 36 PID 884 wrote to memory of 1632 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 36 PID 884 wrote to memory of 1632 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 36 PID 884 wrote to memory of 1632 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 36 PID 884 wrote to memory of 1960 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 38 PID 884 wrote to memory of 1960 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 38 PID 884 wrote to memory of 1960 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 38 PID 884 wrote to memory of 1960 884 1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe"C:\Users\Admin\AppData\Local\Temp\1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe"1⤵
- Checks for any installed AV software in registry
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\PING.EXE"C:\Windows\System32\PING.EXE" 22.61.56.108 -n 42⤵
- Runs ping.exe
PID:1108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72.exe" "C:\Program Files (x86)\ExMultimediaStorage\min_id_resolver.exe"2⤵
- Drops file in Program Files directory
PID:1992
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create SecureElementDataSrv binpath= "C:\Program Files (x86)\ExMultimediaStorage\min_id_resolver.exe delected"2⤵
- Launches sc.exe
PID:948
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start SecureElementDataSrv2⤵
- Launches sc.exe
PID:1720
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" stop SecureElementDataSrv2⤵
- Launches sc.exe
PID:1632
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start SecureElementDataSrv2⤵
- Launches sc.exe
PID:1960
-
-
C:\Program Files (x86)\ExMultimediaStorage\min_id_resolver.exe"C:\Program Files (x86)\ExMultimediaStorage\min_id_resolver.exe" delected1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:288
-
C:\Program Files (x86)\ExMultimediaStorage\min_id_resolver.exe"C:\Program Files (x86)\ExMultimediaStorage\min_id_resolver.exe" delected1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD54f6d5d0ba1aa54880f1bcce5ed4858a4
SHA106d7f2150ebe20a6c3a0e65a46459b5fe2e9ceb2
SHA2561cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72
SHA512fa78f6a16ded41d10bf5a09bfc849452b21e9f0b9d9fe29e9162811aae5912264bf117f30cf2dfd443fa073b925e999ba484ecb6f38b7d8a0f05d839ee40792f
-
Filesize
36KB
MD54f6d5d0ba1aa54880f1bcce5ed4858a4
SHA106d7f2150ebe20a6c3a0e65a46459b5fe2e9ceb2
SHA2561cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72
SHA512fa78f6a16ded41d10bf5a09bfc849452b21e9f0b9d9fe29e9162811aae5912264bf117f30cf2dfd443fa073b925e999ba484ecb6f38b7d8a0f05d839ee40792f
-
Filesize
36KB
MD54f6d5d0ba1aa54880f1bcce5ed4858a4
SHA106d7f2150ebe20a6c3a0e65a46459b5fe2e9ceb2
SHA2561cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72
SHA512fa78f6a16ded41d10bf5a09bfc849452b21e9f0b9d9fe29e9162811aae5912264bf117f30cf2dfd443fa073b925e999ba484ecb6f38b7d8a0f05d839ee40792f