Analysis
-
max time kernel
148s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12/06/2022, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe
Resource
win7-20220414-en
General
-
Target
1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe
-
Size
958KB
-
MD5
f1192a02588dfb2051b7524545a7d0f3
-
SHA1
0569b1b17c61f8d79d207fd12433689ae386cb4f
-
SHA256
1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d
-
SHA512
f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1780 FontCache.exe 1092 PresentationFontCache.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PresentationFontCache.lnk PresentationFontCache.exe -
Loads dropped DLL 7 IoCs
pid Process 480 cmd.exe 1092 PresentationFontCache.exe 1760 WerFault.exe 1760 WerFault.exe 1760 WerFault.exe 1760 WerFault.exe 1760 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1092 set thread context of 1036 1092 PresentationFontCache.exe 47 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1760 1092 WerFault.exe 42 -
NTFS ADS 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\FontCache.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\FontCache.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe\:Zone.Identifier:$DATA cmd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe Token: SeDebugPrivilege 1780 FontCache.exe Token: SeDebugPrivilege 1092 PresentationFontCache.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 944 wrote to memory of 996 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe 27 PID 944 wrote to memory of 996 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe 27 PID 944 wrote to memory of 996 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe 27 PID 944 wrote to memory of 996 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe 27 PID 944 wrote to memory of 1992 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe 29 PID 944 wrote to memory of 1992 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe 29 PID 944 wrote to memory of 1992 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe 29 PID 944 wrote to memory of 1992 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe 29 PID 944 wrote to memory of 2000 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe 31 PID 944 wrote to memory of 2000 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe 31 PID 944 wrote to memory of 2000 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe 31 PID 944 wrote to memory of 2000 944 1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe 31 PID 2000 wrote to memory of 1780 2000 cmd.exe 33 PID 2000 wrote to memory of 1780 2000 cmd.exe 33 PID 2000 wrote to memory of 1780 2000 cmd.exe 33 PID 2000 wrote to memory of 1780 2000 cmd.exe 33 PID 1780 wrote to memory of 428 1780 FontCache.exe 34 PID 1780 wrote to memory of 428 1780 FontCache.exe 34 PID 1780 wrote to memory of 428 1780 FontCache.exe 34 PID 1780 wrote to memory of 428 1780 FontCache.exe 34 PID 1780 wrote to memory of 1364 1780 FontCache.exe 36 PID 1780 wrote to memory of 1364 1780 FontCache.exe 36 PID 1780 wrote to memory of 1364 1780 FontCache.exe 36 PID 1780 wrote to memory of 1364 1780 FontCache.exe 36 PID 1780 wrote to memory of 296 1780 FontCache.exe 38 PID 1780 wrote to memory of 296 1780 FontCache.exe 38 PID 1780 wrote to memory of 296 1780 FontCache.exe 38 PID 1780 wrote to memory of 296 1780 FontCache.exe 38 PID 1780 wrote to memory of 480 1780 FontCache.exe 40 PID 1780 wrote to memory of 480 1780 FontCache.exe 40 PID 1780 wrote to memory of 480 1780 FontCache.exe 40 PID 1780 wrote to memory of 480 1780 FontCache.exe 40 PID 480 wrote to memory of 1092 480 cmd.exe 42 PID 480 wrote to memory of 1092 480 cmd.exe 42 PID 480 wrote to memory of 1092 480 cmd.exe 42 PID 480 wrote to memory of 1092 480 cmd.exe 42 PID 1092 wrote to memory of 1940 1092 PresentationFontCache.exe 43 PID 1092 wrote to memory of 1940 1092 PresentationFontCache.exe 43 PID 1092 wrote to memory of 1940 1092 PresentationFontCache.exe 43 PID 1092 wrote to memory of 1940 1092 PresentationFontCache.exe 43 PID 1092 wrote to memory of 1016 1092 PresentationFontCache.exe 45 PID 1092 wrote to memory of 1016 1092 PresentationFontCache.exe 45 PID 1092 wrote to memory of 1016 1092 PresentationFontCache.exe 45 PID 1092 wrote to memory of 1016 1092 PresentationFontCache.exe 45 PID 1092 wrote to memory of 1036 1092 PresentationFontCache.exe 47 PID 1092 wrote to memory of 1036 1092 PresentationFontCache.exe 47 PID 1092 wrote to memory of 1036 1092 PresentationFontCache.exe 47 PID 1092 wrote to memory of 1036 1092 PresentationFontCache.exe 47 PID 1092 wrote to memory of 1036 1092 PresentationFontCache.exe 47 PID 1092 wrote to memory of 1036 1092 PresentationFontCache.exe 47 PID 1092 wrote to memory of 1036 1092 PresentationFontCache.exe 47 PID 1092 wrote to memory of 1036 1092 PresentationFontCache.exe 47 PID 1092 wrote to memory of 1036 1092 PresentationFontCache.exe 47 PID 1092 wrote to memory of 1036 1092 PresentationFontCache.exe 47 PID 1092 wrote to memory of 1036 1092 PresentationFontCache.exe 47 PID 1092 wrote to memory of 1036 1092 PresentationFontCache.exe 47 PID 1092 wrote to memory of 1760 1092 PresentationFontCache.exe 48 PID 1092 wrote to memory of 1760 1092 PresentationFontCache.exe 48 PID 1092 wrote to memory of 1760 1092 PresentationFontCache.exe 48 PID 1092 wrote to memory of 1760 1092 PresentationFontCache.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe"C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe:Zone.Identifier"2⤵
- NTFS ADS
PID:996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\1f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d.exe:Zone.Identifier"2⤵
- NTFS ADS
PID:1992
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\Temp\FontCache.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\FontCache.exe"C:\Users\Admin\AppData\Local\Temp\FontCache.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\FontCache.exe:Zone.Identifier"4⤵
- NTFS ADS
PID:428
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\FontCache.exe:Zone.Identifier"4⤵
- NTFS ADS
PID:1364
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\FontCache.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe"4⤵
- NTFS ADS
PID:296
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe"5⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe:Zone.Identifier"6⤵
- NTFS ADS
PID:1940
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\PresentationFontCache.exe:Zone.Identifier"6⤵
- NTFS ADS
PID:1016
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"6⤵PID:1036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 11006⤵
- Loads dropped DLL
- Program crash
PID:1760
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
958KB
MD5f1192a02588dfb2051b7524545a7d0f3
SHA10569b1b17c61f8d79d207fd12433689ae386cb4f
SHA2561f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d
SHA512f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3
-
Filesize
958KB
MD5f1192a02588dfb2051b7524545a7d0f3
SHA10569b1b17c61f8d79d207fd12433689ae386cb4f
SHA2561f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d
SHA512f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3
-
Filesize
958KB
MD5f1192a02588dfb2051b7524545a7d0f3
SHA10569b1b17c61f8d79d207fd12433689ae386cb4f
SHA2561f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d
SHA512f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3
-
Filesize
958KB
MD5f1192a02588dfb2051b7524545a7d0f3
SHA10569b1b17c61f8d79d207fd12433689ae386cb4f
SHA2561f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d
SHA512f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3
-
Filesize
958KB
MD5f1192a02588dfb2051b7524545a7d0f3
SHA10569b1b17c61f8d79d207fd12433689ae386cb4f
SHA2561f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d
SHA512f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3
-
Filesize
958KB
MD5f1192a02588dfb2051b7524545a7d0f3
SHA10569b1b17c61f8d79d207fd12433689ae386cb4f
SHA2561f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d
SHA512f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3
-
Filesize
958KB
MD5f1192a02588dfb2051b7524545a7d0f3
SHA10569b1b17c61f8d79d207fd12433689ae386cb4f
SHA2561f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d
SHA512f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3
-
Filesize
958KB
MD5f1192a02588dfb2051b7524545a7d0f3
SHA10569b1b17c61f8d79d207fd12433689ae386cb4f
SHA2561f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d
SHA512f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3
-
Filesize
958KB
MD5f1192a02588dfb2051b7524545a7d0f3
SHA10569b1b17c61f8d79d207fd12433689ae386cb4f
SHA2561f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d
SHA512f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3
-
Filesize
958KB
MD5f1192a02588dfb2051b7524545a7d0f3
SHA10569b1b17c61f8d79d207fd12433689ae386cb4f
SHA2561f2f65ef1c3fb25eb078a61a9e1a3b01bbac9c502294df72b45faaa19687b42d
SHA512f25b0ede75346db5c7aa6a68130a1c1661f0135d3fbc7af7ee4e96bbd2c1cde500ef7f480541743df4ef4241bc2b66f4304e2364b6444552857eead13ec173f3