Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-06-2022 07:11
Static task
static1
Behavioral task
behavioral1
Sample
21ddbef7a8d998786b0b7acf5677fecf35bd7cc00b973850b6709671c3fff37a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
21ddbef7a8d998786b0b7acf5677fecf35bd7cc00b973850b6709671c3fff37a.exe
Resource
win10v2004-20220414-en
General
-
Target
21ddbef7a8d998786b0b7acf5677fecf35bd7cc00b973850b6709671c3fff37a.exe
-
Size
235KB
-
MD5
4b53491b53623cc0a8616eaedea6f81c
-
SHA1
db2ea45c85e25dedf3e4a332b3bcd2b94e12ac3f
-
SHA256
21ddbef7a8d998786b0b7acf5677fecf35bd7cc00b973850b6709671c3fff37a
-
SHA512
01a2de0218babfa5a280fcd77a6a1ad681b124b2836b113cb161255b94ce13060b11412a26052b2cfda002b62e20c4d64fc76aa48941b9eb763d54ee0b1e109d
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 15 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 740 icacls.exe 540 icacls.exe 1720 icacls.exe 544 icacls.exe 1552 icacls.exe 1320 icacls.exe 1956 icacls.exe 744 icacls.exe 1332 icacls.exe 272 icacls.exe 2024 icacls.exe 1524 icacls.exe 996 icacls.exe 784 icacls.exe 1140 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 8 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1320 taskkill.exe 1656 taskkill.exe 1820 taskkill.exe 1392 taskkill.exe 1256 taskkill.exe 1212 taskkill.exe 292 taskkill.exe 1964 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1320 taskkill.exe Token: SeDebugPrivilege 1656 taskkill.exe Token: SeDebugPrivilege 1820 taskkill.exe Token: SeDebugPrivilege 1392 taskkill.exe Token: SeDebugPrivilege 1256 taskkill.exe Token: SeDebugPrivilege 1212 taskkill.exe Token: SeDebugPrivilege 292 taskkill.exe Token: SeDebugPrivilege 1964 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
21ddbef7a8d998786b0b7acf5677fecf35bd7cc00b973850b6709671c3fff37a.execmd.exedescription pid process target process PID 1036 wrote to memory of 1928 1036 21ddbef7a8d998786b0b7acf5677fecf35bd7cc00b973850b6709671c3fff37a.exe cmd.exe PID 1036 wrote to memory of 1928 1036 21ddbef7a8d998786b0b7acf5677fecf35bd7cc00b973850b6709671c3fff37a.exe cmd.exe PID 1036 wrote to memory of 1928 1036 21ddbef7a8d998786b0b7acf5677fecf35bd7cc00b973850b6709671c3fff37a.exe cmd.exe PID 1928 wrote to memory of 1320 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1320 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1320 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1656 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1656 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1656 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1820 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1820 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1820 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1392 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1392 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1392 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1256 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1256 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1256 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1212 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1212 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1212 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 292 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 292 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 292 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1964 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1964 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1964 1928 cmd.exe taskkill.exe PID 1928 wrote to memory of 1372 1928 cmd.exe attrib.exe PID 1928 wrote to memory of 1372 1928 cmd.exe attrib.exe PID 1928 wrote to memory of 1372 1928 cmd.exe attrib.exe PID 1928 wrote to memory of 1956 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 1956 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 1956 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 744 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 744 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 744 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 1524 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 1524 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 1524 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 1332 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 1332 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 1332 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 996 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 996 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 996 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 384 1928 cmd.exe attrib.exe PID 1928 wrote to memory of 384 1928 cmd.exe attrib.exe PID 1928 wrote to memory of 384 1928 cmd.exe attrib.exe PID 1928 wrote to memory of 272 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 272 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 272 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 784 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 784 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 784 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 544 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 544 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 544 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 740 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 740 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 740 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 540 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 540 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 540 1928 cmd.exe icacls.exe PID 1928 wrote to memory of 912 1928 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 1372 attrib.exe 384 attrib.exe 912 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21ddbef7a8d998786b0b7acf5677fecf35bd7cc00b973850b6709671c3fff37a.exe"C:\Users\Admin\AppData\Local\Temp\21ddbef7a8d998786b0b7acf5677fecf35bd7cc00b973850b6709671c3fff37a.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5FA.tmp\5FB.tmp\5FC.bat C:\Users\Admin\AppData\Local\Temp\21ddbef7a8d998786b0b7acf5677fecf35bd7cc00b973850b6709671c3fff37a.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /IM IntelConfigService.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /IM msexec.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /IM cftmon.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /IM ntosknl.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /IM sqlserver.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /IM xCoreManagment.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /IM ApplicationsFrameHost.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /IM Wrap.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\attrib.exeattrib "C:\ProgramData\MicrosoftUpdateManager" -s -h -r /S /D3⤵
- Views/modifies file attributes
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\MicrosoftUpdateManager" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\MicrosoftUpdateManager" /inheritance:e /grant "SYSTEM:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\MicrosoftUpdateManager" /inheritance:e /grant "Administrators:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\MicrosoftUpdateManager" /inheritance:e /grant "Users:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\MicrosoftUpdateManager" /inheritance:e /grant "Admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\attrib.exeattrib "C:\ProgramData\WindowsBackup" -s -h -r /S /D3⤵
- Views/modifies file attributes
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\WindowsBackup" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\WindowsBackup" /inheritance:e /grant "SYSTEM:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\WindowsBackup" /inheritance:e /grant "Administrators:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\WindowsBackup" /inheritance:e /grant "Users:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\WindowsBackup" /inheritance:e /grant "Admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\attrib.exeattrib "C:\ProgramData\IntelCore" -s -h -r /S /D3⤵
- Views/modifies file attributes
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\IntelCore" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\IntelCore" /inheritance:e /grant "SYSTEM:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\IntelCore" /inheritance:e /grant "Administrators:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\IntelCore" /inheritance:e /grant "Users:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\IntelCore" /inheritance:e /grant "Admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\system32\reg.exeREG DELETE HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v Windows Update Manager /F3⤵
-
C:\Windows\system32\reg.exeREG DELETE HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v Windows Update Manager /F3⤵
-
C:\Windows\system32\reg.exeREG DELETE HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v Windows Update Manager /F3⤵
-
C:\Windows\system32\reg.exeREG DELETE HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v System /F3⤵
-
C:\Windows\system32\reg.exeREG DELETE HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v System /F3⤵
-
C:\Windows\system32\reg.exeREG DELETE HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v System /F3⤵
-
C:\Windows\system32\reg.exeREG DELETE HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v Windows Start-Up Application /F3⤵
-
C:\Windows\system32\reg.exeREG DELETE HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v Windows Start-Up Application /F3⤵
-
C:\Windows\system32\reg.exeREG DELETE HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v Windows Start-Up Application /F3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5FA.tmp\5FB.tmp\5FC.batFilesize
2KB
MD5b8c26dc9560c1406c0738ca755dc3caf
SHA105993ce61ba127b1bc72006d826561974c1046bb
SHA2561e7fe4fd0c12a3e4577634b1dc2fc75c7579cd23d6eab9f5f22f18c6eb22514a
SHA512e59cce1ca34b363586a4cd778fc0121b19d29af270285b813f219f0582f71f14e13a8aab3f130703664cdc9a2ed962e394684f81e3cd865a307726996091998a
-
memory/272-72-0x0000000000000000-mapping.dmp
-
memory/292-63-0x0000000000000000-mapping.dmp
-
memory/384-71-0x0000000000000000-mapping.dmp
-
memory/520-85-0x0000000000000000-mapping.dmp
-
memory/540-76-0x0000000000000000-mapping.dmp
-
memory/544-74-0x0000000000000000-mapping.dmp
-
memory/740-75-0x0000000000000000-mapping.dmp
-
memory/744-67-0x0000000000000000-mapping.dmp
-
memory/784-73-0x0000000000000000-mapping.dmp
-
memory/912-77-0x0000000000000000-mapping.dmp
-
memory/996-70-0x0000000000000000-mapping.dmp
-
memory/1036-54-0x000007FEFBAA1000-0x000007FEFBAA3000-memory.dmpFilesize
8KB
-
memory/1140-79-0x0000000000000000-mapping.dmp
-
memory/1168-84-0x0000000000000000-mapping.dmp
-
memory/1212-62-0x0000000000000000-mapping.dmp
-
memory/1256-61-0x0000000000000000-mapping.dmp
-
memory/1256-91-0x0000000000000000-mapping.dmp
-
memory/1312-88-0x0000000000000000-mapping.dmp
-
memory/1316-87-0x0000000000000000-mapping.dmp
-
memory/1320-81-0x0000000000000000-mapping.dmp
-
memory/1320-57-0x0000000000000000-mapping.dmp
-
memory/1332-69-0x0000000000000000-mapping.dmp
-
memory/1372-65-0x0000000000000000-mapping.dmp
-
memory/1392-60-0x0000000000000000-mapping.dmp
-
memory/1404-90-0x0000000000000000-mapping.dmp
-
memory/1524-68-0x0000000000000000-mapping.dmp
-
memory/1552-78-0x0000000000000000-mapping.dmp
-
memory/1568-89-0x0000000000000000-mapping.dmp
-
memory/1656-58-0x0000000000000000-mapping.dmp
-
memory/1656-83-0x0000000000000000-mapping.dmp
-
memory/1696-86-0x0000000000000000-mapping.dmp
-
memory/1720-80-0x0000000000000000-mapping.dmp
-
memory/1820-59-0x0000000000000000-mapping.dmp
-
memory/1928-55-0x0000000000000000-mapping.dmp
-
memory/1956-66-0x0000000000000000-mapping.dmp
-
memory/1964-64-0x0000000000000000-mapping.dmp
-
memory/2024-82-0x0000000000000000-mapping.dmp