Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe
Resource
win10v2004-20220901-en
General
-
Target
c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe
-
Size
34KB
-
MD5
48c04c677691120206ff0ff6bc0f7479
-
SHA1
4b42ee6dcd17b59290d51c65f87b59c70aef73da
-
SHA256
c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504
-
SHA512
3f1d57bd8d63e7c4b7a475addefa84fcc52c9acccd1a7c07572a81900aba3de31539efc2abcbfc03b09d636fe3f48524ecccb9cc4ed786f736581de82ce5bd6c
-
SSDEEP
384:kbpj0UJHMiGrNKhj29JxOXwRe55gqi/1EzxFc23ZvgoxkpWjlymKDgKDfKDqY4J:W0SHzKEhAYXwquqitEtG2vgoOp/Y4J
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2044 Syst.exe -
Deletes itself 1 IoCs
pid Process 2044 Syst.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DefSysdify = "C:\\Windows\\Syst.exe" Syst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DefSysdify = "C:\\Windows\\Syst.exe" c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Syst.exe c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe File opened for modification C:\Windows\Syst.exe c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe File created C:\Windows\tempSyst.dat c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1292 c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe 1292 c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe 2044 Syst.exe 2044 Syst.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2044 1292 c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe 27 PID 1292 wrote to memory of 2044 1292 c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe 27 PID 1292 wrote to memory of 2044 1292 c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe 27 PID 1292 wrote to memory of 2044 1292 c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe"C:\Users\Admin\AppData\Local\Temp\c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\Syst.exe"C:\Windows\Syst.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD548c04c677691120206ff0ff6bc0f7479
SHA14b42ee6dcd17b59290d51c65f87b59c70aef73da
SHA256c18c6381224413ae63519eb4d3312832c6f51ea8dc90b8c98d3903e2b1b96504
SHA5123f1d57bd8d63e7c4b7a475addefa84fcc52c9acccd1a7c07572a81900aba3de31539efc2abcbfc03b09d636fe3f48524ecccb9cc4ed786f736581de82ce5bd6c
-
Filesize
102B
MD56b75050a03e4e2474e4fed4ea767f148
SHA112be113e6e9b3cccf400b6743b3e676ef04abdcd
SHA25638f06c0765e5d9722709472769da9b9c95fb39deb7f469eb8622d8eb89bbdb84
SHA5128d29ab8918e1e038f1604adc0b60dbcc3fa9c1268e7d8f758629f363cbcbf811f2eecd9b8c04bd2dd05605cb1bfb5d75463db792677f3942262f0c242e41834e