Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 16:14
Static task
static1
Behavioral task
behavioral1
Sample
555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe
Resource
win10v2004-20220721-en
General
-
Target
555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe
-
Size
1.6MB
-
MD5
a3ecf903e0ee1f392efbd7af61062032
-
SHA1
237c6daeab86c669b1c821e13c2ec119845d108d
-
SHA256
555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685
-
SHA512
c803f9a51dc654d6da039d05ee195202a0c6a049e7101b75c78c9783f4269c1eb20c4a76b68c172cb94e54fe03c9e38554d6c8405ca741ec112b6b751c0ccc66
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
atd.exeatd.exepid process 1584 atd.exe 1692 atd.exe -
Drops startup file 1 IoCs
Processes:
555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PIPLXE.lnk 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe -
Loads dropped DLL 4 IoCs
Processes:
555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exeatd.exe555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exepid process 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1584 atd.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\Run 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\Run\PIPLXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windata\\OZLUIF.exe\"" 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ipapi.co 5 ipapi.co 11 checkip.dyndns.org -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1232-63-0x0000000000000000-mapping.dmp autoit_exe behavioral1/memory/1232-66-0x0000000000400000-0x00000000004B9000-memory.dmp autoit_exe behavioral1/memory/1232-68-0x0000000000400000-0x00000000004B9000-memory.dmp autoit_exe behavioral1/memory/1232-69-0x0000000000400000-0x00000000004B9000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
atd.exedescription pid process target process PID 1584 set thread context of 1692 1584 atd.exe atd.exe PID 1584 set thread context of 1692 1584 atd.exe atd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exepid process 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1232 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exeatd.exepid process 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 1584 atd.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exeatd.exedescription pid process target process PID 1908 wrote to memory of 1584 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe atd.exe PID 1908 wrote to memory of 1584 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe atd.exe PID 1908 wrote to memory of 1584 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe atd.exe PID 1908 wrote to memory of 1584 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe atd.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1908 wrote to memory of 1232 1908 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe 555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe PID 1584 wrote to memory of 1692 1584 atd.exe atd.exe PID 1584 wrote to memory of 1692 1584 atd.exe atd.exe PID 1584 wrote to memory of 1692 1584 atd.exe atd.exe PID 1584 wrote to memory of 1692 1584 atd.exe atd.exe PID 1584 wrote to memory of 1692 1584 atd.exe atd.exe PID 1584 wrote to memory of 1692 1584 atd.exe atd.exe PID 1584 wrote to memory of 1692 1584 atd.exe atd.exe PID 1584 wrote to memory of 1692 1584 atd.exe atd.exe PID 1584 wrote to memory of 1692 1584 atd.exe atd.exe PID 1584 wrote to memory of 1692 1584 atd.exe atd.exe PID 1584 wrote to memory of 1692 1584 atd.exe atd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe"C:\Users\Admin\AppData\Local\Temp\555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\atd.exe"C:\Users\Admin\AppData\Local\Temp\atd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\atd.exe"C:\Users\Admin\AppData\Local\Temp\atd.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe"C:\Users\Admin\AppData\Local\Temp\555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\atd.exeFilesize
476KB
MD50ae10f7b0c6a87e26273108537720021
SHA11d570c7448ddb6d921a03be6db7d0fc49cdd6e10
SHA256e480728932889eda19b6197def775250eb96ccf23c18fd28a95b0d3da41324e9
SHA512a53a9287ec4f55537e49bf1e4b3730c582efb0916ae11c2aabf0ca354ae475548bcb1e2ff8115a2b37e17037c80a5a6084162b626acd2d9310ebee4c3af3da7c
-
C:\Users\Admin\AppData\Local\Temp\atd.exeFilesize
476KB
MD50ae10f7b0c6a87e26273108537720021
SHA11d570c7448ddb6d921a03be6db7d0fc49cdd6e10
SHA256e480728932889eda19b6197def775250eb96ccf23c18fd28a95b0d3da41324e9
SHA512a53a9287ec4f55537e49bf1e4b3730c582efb0916ae11c2aabf0ca354ae475548bcb1e2ff8115a2b37e17037c80a5a6084162b626acd2d9310ebee4c3af3da7c
-
C:\Users\Admin\AppData\Local\Temp\atd.exeFilesize
476KB
MD50ae10f7b0c6a87e26273108537720021
SHA11d570c7448ddb6d921a03be6db7d0fc49cdd6e10
SHA256e480728932889eda19b6197def775250eb96ccf23c18fd28a95b0d3da41324e9
SHA512a53a9287ec4f55537e49bf1e4b3730c582efb0916ae11c2aabf0ca354ae475548bcb1e2ff8115a2b37e17037c80a5a6084162b626acd2d9310ebee4c3af3da7c
-
\Users\Admin\AppData\Local\Temp\atd.exeFilesize
476KB
MD50ae10f7b0c6a87e26273108537720021
SHA11d570c7448ddb6d921a03be6db7d0fc49cdd6e10
SHA256e480728932889eda19b6197def775250eb96ccf23c18fd28a95b0d3da41324e9
SHA512a53a9287ec4f55537e49bf1e4b3730c582efb0916ae11c2aabf0ca354ae475548bcb1e2ff8115a2b37e17037c80a5a6084162b626acd2d9310ebee4c3af3da7c
-
\Users\Admin\AppData\Local\Temp\atd.exeFilesize
476KB
MD50ae10f7b0c6a87e26273108537720021
SHA11d570c7448ddb6d921a03be6db7d0fc49cdd6e10
SHA256e480728932889eda19b6197def775250eb96ccf23c18fd28a95b0d3da41324e9
SHA512a53a9287ec4f55537e49bf1e4b3730c582efb0916ae11c2aabf0ca354ae475548bcb1e2ff8115a2b37e17037c80a5a6084162b626acd2d9310ebee4c3af3da7c
-
\Users\Admin\AppData\Local\Temp\atd.exeFilesize
476KB
MD50ae10f7b0c6a87e26273108537720021
SHA11d570c7448ddb6d921a03be6db7d0fc49cdd6e10
SHA256e480728932889eda19b6197def775250eb96ccf23c18fd28a95b0d3da41324e9
SHA512a53a9287ec4f55537e49bf1e4b3730c582efb0916ae11c2aabf0ca354ae475548bcb1e2ff8115a2b37e17037c80a5a6084162b626acd2d9310ebee4c3af3da7c
-
\Users\Admin\AppData\Roaming\Windata\OZLUIF.exeFilesize
1.6MB
MD5a3ecf903e0ee1f392efbd7af61062032
SHA1237c6daeab86c669b1c821e13c2ec119845d108d
SHA256555f88b245ceee8f51243a2dd7bd51c11d213f88a58b78659f8781176954a685
SHA512c803f9a51dc654d6da039d05ee195202a0c6a049e7101b75c78c9783f4269c1eb20c4a76b68c172cb94e54fe03c9e38554d6c8405ca741ec112b6b751c0ccc66
-
memory/1232-63-0x0000000000000000-mapping.dmp
-
memory/1232-66-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/1232-68-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/1232-69-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/1584-70-0x00000000002C0000-0x00000000002C6000-memory.dmpFilesize
24KB
-
memory/1584-60-0x0000000000000000-mapping.dmp
-
memory/1692-75-0x000000000040140A-mapping.dmp
-
memory/1692-81-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1692-74-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1692-90-0x0000000074120000-0x00000000746CB000-memory.dmpFilesize
5.7MB
-
memory/1692-79-0x0000000000402000-0x0000000000403000-memory.dmpFilesize
4KB
-
memory/1692-78-0x0000000000400000-0x0000000000401000-memory.dmpFilesize
4KB
-
memory/1692-80-0x0000000000402000-0x0000000000403000-memory.dmpFilesize
4KB
-
memory/1692-89-0x0000000000401000-0x000000000044F000-memory.dmpFilesize
312KB
-
memory/1692-88-0x0000000074120000-0x00000000746CB000-memory.dmpFilesize
5.7MB
-
memory/1692-84-0x0000000000401000-0x000000000044F000-memory.dmpFilesize
312KB
-
memory/1692-85-0x0000000000401000-0x000000000044F000-memory.dmpFilesize
312KB
-
memory/1692-86-0x0000000000401000-0x000000000044F000-memory.dmpFilesize
312KB
-
memory/1692-87-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1908-57-0x00000000754D1000-0x00000000754D3000-memory.dmpFilesize
8KB
-
memory/1908-56-0x0000000000300000-0x0000000000306000-memory.dmpFilesize
24KB
-
memory/1908-65-0x0000000000300000-0x0000000000306000-memory.dmpFilesize
24KB