Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 16:02
Static task
static1
Behavioral task
behavioral1
Sample
Circular de Resolución No. 2901..exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Circular de Resolución No. 2901..exe
Resource
win10v2004-20220901-en
General
-
Target
Circular de Resolución No. 2901..exe
-
Size
3.1MB
-
MD5
ef60fcaf6ddedd0a3fdb93732cca0902
-
SHA1
e71d10f577df8a6d111f3571079bdfb583f30f62
-
SHA256
9015e5c60b8bd504c8fb6eff20e85f022ab7bdef3209c8743d328f23c864ec39
-
SHA512
1435bb539c6156b4e7d9000fa4f4a64403a70397d18c17f74cd1be5eac0570e44e92df4edcc48ea2a20487c8cccfe71fa374b5c2a8e55e5df0e9c7c6d7fe7afc
-
SSDEEP
98304:l9QHRIEF7KhO2fZzDnUEZ3QiVkc8JcDv:QHvUuO6c8JcD
Malware Config
Extracted
bitrat
1.38
bendicion777.con-ip.com:7777
-
communication_password
202cb962ac59075b964b07152d234b70
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1672-64-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1672-66-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1672-67-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1672-70-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1672-69-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1672-71-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1672-73-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1672-76-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Circular de Resolución No. 2901..exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\chrome = "\"C:\\Users\\Admin\\AppData\\Roaming\\Ljqcjwv\\chrome.exe\"" Circular de Resolución No. 2901..exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
InstallUtil.exepid process 1672 InstallUtil.exe 1672 InstallUtil.exe 1672 InstallUtil.exe 1672 InstallUtil.exe 1672 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Circular de Resolución No. 2901..exedescription pid process target process PID 1248 set thread context of 1672 1248 Circular de Resolución No. 2901..exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 628 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Circular de Resolución No. 2901..exepowershell.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1248 Circular de Resolución No. 2901..exe Token: SeDebugPrivilege 628 powershell.exe Token: SeDebugPrivilege 1672 InstallUtil.exe Token: SeShutdownPrivilege 1672 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
InstallUtil.exepid process 1672 InstallUtil.exe 1672 InstallUtil.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Circular de Resolución No. 2901..exedescription pid process target process PID 1248 wrote to memory of 628 1248 Circular de Resolución No. 2901..exe powershell.exe PID 1248 wrote to memory of 628 1248 Circular de Resolución No. 2901..exe powershell.exe PID 1248 wrote to memory of 628 1248 Circular de Resolución No. 2901..exe powershell.exe PID 1248 wrote to memory of 628 1248 Circular de Resolución No. 2901..exe powershell.exe PID 1248 wrote to memory of 1672 1248 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1248 wrote to memory of 1672 1248 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1248 wrote to memory of 1672 1248 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1248 wrote to memory of 1672 1248 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1248 wrote to memory of 1672 1248 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1248 wrote to memory of 1672 1248 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1248 wrote to memory of 1672 1248 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1248 wrote to memory of 1672 1248 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1248 wrote to memory of 1672 1248 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1248 wrote to memory of 1672 1248 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1248 wrote to memory of 1672 1248 Circular de Resolución No. 2901..exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Circular de Resolución No. 2901..exe"C:\Users\Admin\AppData\Local\Temp\Circular de Resolución No. 2901..exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1672