Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 23:50
Static task
static1
Behavioral task
behavioral1
Sample
5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe
Resource
win7-20220718-en
General
-
Target
5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe
-
Size
321KB
-
MD5
fe68a016b5c819601765317d4abf1cee
-
SHA1
2fb8ff8c27498fe3954fa8ce77b13402763c5949
-
SHA256
5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a
-
SHA512
3aae9a2066e88d46d5ecaef676f836425a7743fdea78660e97fc62ab70eb86cffa2ba9cb967304acd68e13bcd708f4f82a04fde90e02c9318d80c10a4dc3226e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1516 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe -
Deletes itself 1 IoCs
pid Process 1704 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 996 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe 996 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1320 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1516 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 996 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe Token: SeDebugPrivilege 1516 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe Token: 33 1516 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe Token: SeIncBasePriorityPrivilege 1516 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1516 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 996 wrote to memory of 1516 996 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe 28 PID 996 wrote to memory of 1516 996 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe 28 PID 996 wrote to memory of 1516 996 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe 28 PID 996 wrote to memory of 1516 996 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe 28 PID 996 wrote to memory of 1704 996 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe 29 PID 996 wrote to memory of 1704 996 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe 29 PID 996 wrote to memory of 1704 996 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe 29 PID 996 wrote to memory of 1704 996 5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe 29 PID 1704 wrote to memory of 1320 1704 cmd.exe 31 PID 1704 wrote to memory of 1320 1704 cmd.exe 31 PID 1704 wrote to memory of 1320 1704 cmd.exe 31 PID 1704 wrote to memory of 1320 1704 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe"C:\Users\Admin\AppData\Local\Temp\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe"C:\Users\Admin\AppData\Local\Temp\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1516
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:1320
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe
Filesize321KB
MD5fe68a016b5c819601765317d4abf1cee
SHA12fb8ff8c27498fe3954fa8ce77b13402763c5949
SHA2565d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a
SHA5123aae9a2066e88d46d5ecaef676f836425a7743fdea78660e97fc62ab70eb86cffa2ba9cb967304acd68e13bcd708f4f82a04fde90e02c9318d80c10a4dc3226e
-
C:\Users\Admin\AppData\Local\Temp\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe
Filesize321KB
MD5fe68a016b5c819601765317d4abf1cee
SHA12fb8ff8c27498fe3954fa8ce77b13402763c5949
SHA2565d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a
SHA5123aae9a2066e88d46d5ecaef676f836425a7743fdea78660e97fc62ab70eb86cffa2ba9cb967304acd68e13bcd708f4f82a04fde90e02c9318d80c10a4dc3226e
-
\Users\Admin\AppData\Local\Temp\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe
Filesize321KB
MD5fe68a016b5c819601765317d4abf1cee
SHA12fb8ff8c27498fe3954fa8ce77b13402763c5949
SHA2565d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a
SHA5123aae9a2066e88d46d5ecaef676f836425a7743fdea78660e97fc62ab70eb86cffa2ba9cb967304acd68e13bcd708f4f82a04fde90e02c9318d80c10a4dc3226e
-
\Users\Admin\AppData\Local\Temp\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a\5d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a.exe
Filesize321KB
MD5fe68a016b5c819601765317d4abf1cee
SHA12fb8ff8c27498fe3954fa8ce77b13402763c5949
SHA2565d565fb045b217f3de803f67883d3a3200488073440138f47d97b1767ea4981a
SHA5123aae9a2066e88d46d5ecaef676f836425a7743fdea78660e97fc62ab70eb86cffa2ba9cb967304acd68e13bcd708f4f82a04fde90e02c9318d80c10a4dc3226e