Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 03:17
Static task
static1
Behavioral task
behavioral1
Sample
6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe
Resource
win10v2004-20220721-en
General
-
Target
6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe
-
Size
724KB
-
MD5
61234732aaee3b52d2a921c61f4a5ca0
-
SHA1
af3b4b38706e62632d33ed46c14db107b2e86087
-
SHA256
6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754
-
SHA512
c5db3da3a615f95caed497d86d2582145f1b31e9effd2c16976a55adb12f9f74acd78a728f9f8fda791199f6675dc6b6f388e7465d3d1f89f45dac674d2ab6c5
Malware Config
Signatures
-
Processes:
Emerge.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Emerge.exe -
Processes:
Emerge.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" Emerge.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N3S8L5V2-L0C7-N6Q5-Y5J3-W6M7F112Y5H0 = "C:\\Users\\Admin\\AppData\\Roaming\\N3S8L5V2-L0C7-N6Q5-Y5J3-W6M7F112Y5H0\\N3S8L5V2-L0C7-N6Q5-Y5J3-W6M7F112Y5H0.exe" iexplore.exe -
Executes dropped EXE 2 IoCs
Processes:
Emerge.exeEmerge.exepid Process 1716 Emerge.exe 572 Emerge.exe -
Loads dropped DLL 3 IoCs
Processes:
6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exeEmerge.exepid Process 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 1716 Emerge.exe -
Processes:
Emerge.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" Emerge.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
iexplore.exereg.EXEdescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\N3S8L5V2-L0C7-N6Q5-Y5J3-W6M7F112Y5H0 = "C:\\Users\\Admin\\AppData\\Roaming\\N3S8L5V2-L0C7-N6Q5-Y5J3-W6M7F112Y5H0\\N3S8L5V2-L0C7-N6Q5-Y5J3-W6M7F112Y5H0.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\Abidingness2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Emerge.exe" reg.EXE Key created \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\N3S8L5V2-L0C7-N6Q5-Y5J3-W6M7F112Y5H0 = "C:\\Users\\Admin\\AppData\\Roaming\\N3S8L5V2-L0C7-N6Q5-Y5J3-W6M7F112Y5H0\\N3S8L5V2-L0C7-N6Q5-Y5J3-W6M7F112Y5H0.exe" iexplore.exe -
Processes:
Emerge.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Emerge.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Emerge.exeEmerge.exedescription pid Process procid_target PID 1716 set thread context of 572 1716 Emerge.exe 35 PID 572 set thread context of 1116 572 Emerge.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Emerge.exepid Process 572 Emerge.exe 572 Emerge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
iexplore.exedescription pid Process Token: SeDebugPrivilege 1116 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exeEmerge.exeEmerge.exeiexplore.exepid Process 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 1716 Emerge.exe 572 Emerge.exe 1116 iexplore.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exetaskeng.exeEmerge.exeEmerge.exedescription pid Process procid_target PID 1956 wrote to memory of 988 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 28 PID 1956 wrote to memory of 988 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 28 PID 1956 wrote to memory of 988 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 28 PID 1956 wrote to memory of 988 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 28 PID 1956 wrote to memory of 1284 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 30 PID 1956 wrote to memory of 1284 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 30 PID 1956 wrote to memory of 1284 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 30 PID 1956 wrote to memory of 1284 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 30 PID 1956 wrote to memory of 1716 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 32 PID 1956 wrote to memory of 1716 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 32 PID 1956 wrote to memory of 1716 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 32 PID 1956 wrote to memory of 1716 1956 6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe 32 PID 2012 wrote to memory of 1852 2012 taskeng.exe 34 PID 2012 wrote to memory of 1852 2012 taskeng.exe 34 PID 2012 wrote to memory of 1852 2012 taskeng.exe 34 PID 1716 wrote to memory of 572 1716 Emerge.exe 35 PID 1716 wrote to memory of 572 1716 Emerge.exe 35 PID 1716 wrote to memory of 572 1716 Emerge.exe 35 PID 1716 wrote to memory of 572 1716 Emerge.exe 35 PID 1716 wrote to memory of 572 1716 Emerge.exe 35 PID 1716 wrote to memory of 572 1716 Emerge.exe 35 PID 1716 wrote to memory of 572 1716 Emerge.exe 35 PID 1716 wrote to memory of 572 1716 Emerge.exe 35 PID 1716 wrote to memory of 572 1716 Emerge.exe 35 PID 1716 wrote to memory of 572 1716 Emerge.exe 35 PID 572 wrote to memory of 1116 572 Emerge.exe 36 PID 572 wrote to memory of 1116 572 Emerge.exe 36 PID 572 wrote to memory of 1116 572 Emerge.exe 36 PID 572 wrote to memory of 1116 572 Emerge.exe 36 PID 572 wrote to memory of 1116 572 Emerge.exe 36 PID 572 wrote to memory of 1116 572 Emerge.exe 36 PID 572 wrote to memory of 1116 572 Emerge.exe 36 PID 572 wrote to memory of 1116 572 Emerge.exe 36 PID 572 wrote to memory of 1116 572 Emerge.exe 36 -
System policy modification 1 TTPs 1 IoCs
Processes:
Emerge.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Emerge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe"C:\Users\Admin\AppData\Local\Temp\6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC HOURLY /MO 23 /TN "Abidingness2" /TR "reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "\""Abidingness2"\"" /f /t REG_SZ /d "\""C:\Users\Admin\AppData\Local\Temp\Emerge.exe\""2⤵
- Creates scheduled task(s)
PID:988
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /run /tn "Abidingness2"2⤵PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\Emerge.exe"C:\Users\Admin\AppData\Local\Temp\Emerge.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\Emerge.exe"C:\Users\Admin\AppData\Local\Temp\Emerge.exe"3⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:572 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\Emerge.exe4⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1116
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {151789F2-3B0D-4B03-9C31-2C6CFE0C2854} S-1-5-21-3762437355-3468409815-1164039494-1000:TZEOUYSL\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\reg.EXEC:\Windows\system32\reg.EXE add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "Abidingness2" /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Emerge.exe"2⤵
- Adds Run key to start application
- Modifies registry key
PID:1852
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD5c8d1b48fefc657e31e884d52d9389e6b
SHA1cf3da2ad535e05c3eaa6c34ef334b6eea08f2c3c
SHA2564c986eec3ff23bf14f32cdf7b081e671c5bb79e020c17f6fdb0f0a07ba9a7319
SHA512d7b3682dad57c0d679b25de1324bed4e20928a978130280db7347af481fc877e045b67e6d75331fcb2597665f54137a874f51c60f9f21cd83fa33f04fd24dd09
-
Filesize
724KB
MD5c8d1b48fefc657e31e884d52d9389e6b
SHA1cf3da2ad535e05c3eaa6c34ef334b6eea08f2c3c
SHA2564c986eec3ff23bf14f32cdf7b081e671c5bb79e020c17f6fdb0f0a07ba9a7319
SHA512d7b3682dad57c0d679b25de1324bed4e20928a978130280db7347af481fc877e045b67e6d75331fcb2597665f54137a874f51c60f9f21cd83fa33f04fd24dd09
-
Filesize
724KB
MD5c8d1b48fefc657e31e884d52d9389e6b
SHA1cf3da2ad535e05c3eaa6c34ef334b6eea08f2c3c
SHA2564c986eec3ff23bf14f32cdf7b081e671c5bb79e020c17f6fdb0f0a07ba9a7319
SHA512d7b3682dad57c0d679b25de1324bed4e20928a978130280db7347af481fc877e045b67e6d75331fcb2597665f54137a874f51c60f9f21cd83fa33f04fd24dd09
-
Filesize
724KB
MD5c8d1b48fefc657e31e884d52d9389e6b
SHA1cf3da2ad535e05c3eaa6c34ef334b6eea08f2c3c
SHA2564c986eec3ff23bf14f32cdf7b081e671c5bb79e020c17f6fdb0f0a07ba9a7319
SHA512d7b3682dad57c0d679b25de1324bed4e20928a978130280db7347af481fc877e045b67e6d75331fcb2597665f54137a874f51c60f9f21cd83fa33f04fd24dd09
-
Filesize
724KB
MD5c8d1b48fefc657e31e884d52d9389e6b
SHA1cf3da2ad535e05c3eaa6c34ef334b6eea08f2c3c
SHA2564c986eec3ff23bf14f32cdf7b081e671c5bb79e020c17f6fdb0f0a07ba9a7319
SHA512d7b3682dad57c0d679b25de1324bed4e20928a978130280db7347af481fc877e045b67e6d75331fcb2597665f54137a874f51c60f9f21cd83fa33f04fd24dd09
-
Filesize
724KB
MD5c8d1b48fefc657e31e884d52d9389e6b
SHA1cf3da2ad535e05c3eaa6c34ef334b6eea08f2c3c
SHA2564c986eec3ff23bf14f32cdf7b081e671c5bb79e020c17f6fdb0f0a07ba9a7319
SHA512d7b3682dad57c0d679b25de1324bed4e20928a978130280db7347af481fc877e045b67e6d75331fcb2597665f54137a874f51c60f9f21cd83fa33f04fd24dd09