Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 02:43
Static task
static1
Behavioral task
behavioral1
Sample
5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac.exe
Resource
win10v2004-20220812-en
General
-
Target
5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac.exe
-
Size
743KB
-
MD5
9b36745e7f0a97a16143f08088d843f1
-
SHA1
fa29a12012e74e88fd67cef8f5901dc38cf5a62a
-
SHA256
5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac
-
SHA512
c31fde09da1b505d8dd3a0c91cc0c7cf9065a05b14dbb109f3991678add38bc908065aef162108de5fa89bb069d41dcf6fe13438e0fe4077a8667ec88e4eae2c
-
SSDEEP
12288:rZvJieKMzHYVX4Gksk3yLbl6mDKbm0iw0jDGJEqOOgTuGSGI28lHqux/wJMDtxlo:r1ceLiay9lKbm0amJjOOgyH728hL/wJJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 536 hgz.exe -
Loads dropped DLL 5 IoCs
pid Process 1520 5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac.exe 1520 5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac.exe 1856 WerFault.exe 1856 WerFault.exe 1856 WerFault.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\program files\common files\microsoft shared\msinfo\hgz.jpg 5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac.exe File created C:\program files\common files\microsoft shared\msinfo\QQ½ØͼδÃüÃû.jpg 5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac.exe File opened for modification C:\program files\common files\microsoft shared\msinfo\QQ½ØͼδÃüÃû.png DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1856 536 WerFault.exe 28 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 DllHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1520 wrote to memory of 536 1520 5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac.exe 28 PID 1520 wrote to memory of 536 1520 5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac.exe 28 PID 1520 wrote to memory of 536 1520 5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac.exe 28 PID 1520 wrote to memory of 536 1520 5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac.exe 28 PID 536 wrote to memory of 1856 536 hgz.exe 29 PID 536 wrote to memory of 1856 536 hgz.exe 29 PID 536 wrote to memory of 1856 536 hgz.exe 29 PID 536 wrote to memory of 1856 536 hgz.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac.exe"C:\Users\Admin\AppData\Local\Temp\5056017e5cec1326459aa322214ce1fdd68cb46d1a21aec5bcc38a1ae7d0abac.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\program files\common files\microsoft shared\msinfo\hgz.exe"C:\program files\common files\microsoft shared\msinfo\hgz.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 1563⤵
- Loads dropped DLL
- Program crash
PID:1856
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:1724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735KB
MD58ad8408bbe8c98ad81b2ae73e6132327
SHA1ebf92b9683c8afe4ce02f9373d0efb453a6e2db8
SHA256eb01ef13cf5b79428946d4859aadf7c65cb5e65851739aabeb31ef9746a281d9
SHA512f2a1cb23292f865885bcd21d219efef4e8a60fbd0305147be64247693ea27f12b234535cc96d188e1b437e55eeced366c774df50378876fe574e5b083e1e5cc8
-
Filesize
23KB
MD52cb0a4f71e3c3533a0ad7f28c97eeda4
SHA157d9de9071390c195d9ee21a4dd7b4e1342480f9
SHA2560ad56a9905d47dbb713f464386d9fd971ec72fa89e0002e5a330e663f7533c23
SHA512f4db232bf6bfeff7e5920380742faa1537256d509f5fea8ba18e850d9f73747a82bb7f7cfd3dbc1d91039e6d1507cfdb1204ae25ad23eba40e172cec7a903cef
-
Filesize
735KB
MD58ad8408bbe8c98ad81b2ae73e6132327
SHA1ebf92b9683c8afe4ce02f9373d0efb453a6e2db8
SHA256eb01ef13cf5b79428946d4859aadf7c65cb5e65851739aabeb31ef9746a281d9
SHA512f2a1cb23292f865885bcd21d219efef4e8a60fbd0305147be64247693ea27f12b234535cc96d188e1b437e55eeced366c774df50378876fe574e5b083e1e5cc8
-
Filesize
735KB
MD58ad8408bbe8c98ad81b2ae73e6132327
SHA1ebf92b9683c8afe4ce02f9373d0efb453a6e2db8
SHA256eb01ef13cf5b79428946d4859aadf7c65cb5e65851739aabeb31ef9746a281d9
SHA512f2a1cb23292f865885bcd21d219efef4e8a60fbd0305147be64247693ea27f12b234535cc96d188e1b437e55eeced366c774df50378876fe574e5b083e1e5cc8
-
Filesize
735KB
MD58ad8408bbe8c98ad81b2ae73e6132327
SHA1ebf92b9683c8afe4ce02f9373d0efb453a6e2db8
SHA256eb01ef13cf5b79428946d4859aadf7c65cb5e65851739aabeb31ef9746a281d9
SHA512f2a1cb23292f865885bcd21d219efef4e8a60fbd0305147be64247693ea27f12b234535cc96d188e1b437e55eeced366c774df50378876fe574e5b083e1e5cc8
-
Filesize
735KB
MD58ad8408bbe8c98ad81b2ae73e6132327
SHA1ebf92b9683c8afe4ce02f9373d0efb453a6e2db8
SHA256eb01ef13cf5b79428946d4859aadf7c65cb5e65851739aabeb31ef9746a281d9
SHA512f2a1cb23292f865885bcd21d219efef4e8a60fbd0305147be64247693ea27f12b234535cc96d188e1b437e55eeced366c774df50378876fe574e5b083e1e5cc8
-
Filesize
735KB
MD58ad8408bbe8c98ad81b2ae73e6132327
SHA1ebf92b9683c8afe4ce02f9373d0efb453a6e2db8
SHA256eb01ef13cf5b79428946d4859aadf7c65cb5e65851739aabeb31ef9746a281d9
SHA512f2a1cb23292f865885bcd21d219efef4e8a60fbd0305147be64247693ea27f12b234535cc96d188e1b437e55eeced366c774df50378876fe574e5b083e1e5cc8
-
Filesize
735KB
MD58ad8408bbe8c98ad81b2ae73e6132327
SHA1ebf92b9683c8afe4ce02f9373d0efb453a6e2db8
SHA256eb01ef13cf5b79428946d4859aadf7c65cb5e65851739aabeb31ef9746a281d9
SHA512f2a1cb23292f865885bcd21d219efef4e8a60fbd0305147be64247693ea27f12b234535cc96d188e1b437e55eeced366c774df50378876fe574e5b083e1e5cc8