Analysis
-
max time kernel
43s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 03:20
Static task
static1
Behavioral task
behavioral1
Sample
4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe
Resource
win10v2004-20220812-en
General
-
Target
4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe
-
Size
41KB
-
MD5
71f5acf3d04df2bb0311ab2a46e3547a
-
SHA1
aa8f6a8925912b439ad514cd4c1c16966ba9405d
-
SHA256
4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72
-
SHA512
c8ba33d3b1b38cfbf3aac1eacdec4f92fb612fdd4f1358bcc8e58553666ddea06a8323d6048407c4506d547a8a3ae208a3f1e9477b770c683bfd4b551534bb3e
-
SSDEEP
768:QIBar1ZIZYnfI9opm6AIHIjaI7g9mVmUnNoNE/W5dRV8:pW1ZIZqI9opm6AIHIjzmUmNzd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1152 sxhost.exe -
Deletes itself 1 IoCs
pid Process 916 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1464 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 1464 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1152 1464 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 26 PID 1464 wrote to memory of 1152 1464 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 26 PID 1464 wrote to memory of 1152 1464 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 26 PID 1464 wrote to memory of 1152 1464 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 26 PID 1464 wrote to memory of 916 1464 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 27 PID 1464 wrote to memory of 916 1464 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 27 PID 1464 wrote to memory of 916 1464 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 27 PID 1464 wrote to memory of 916 1464 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 27 PID 1152 wrote to memory of 1552 1152 sxhost.exe 31 PID 1152 wrote to memory of 1552 1152 sxhost.exe 31 PID 1152 wrote to memory of 1552 1152 sxhost.exe 31 PID 1152 wrote to memory of 1552 1152 sxhost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe"C:\Users\Admin\AppData\Local\Temp\4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\sxhost.exe"C:\Users\Admin\sxhost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\sxhost.exe >> NUL3⤵PID:1552
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\4CD45D~1.EXE >> NUL2⤵
- Deletes itself
PID:916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD571f5acf3d04df2bb0311ab2a46e3547a
SHA1aa8f6a8925912b439ad514cd4c1c16966ba9405d
SHA2564cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72
SHA512c8ba33d3b1b38cfbf3aac1eacdec4f92fb612fdd4f1358bcc8e58553666ddea06a8323d6048407c4506d547a8a3ae208a3f1e9477b770c683bfd4b551534bb3e
-
Filesize
41KB
MD571f5acf3d04df2bb0311ab2a46e3547a
SHA1aa8f6a8925912b439ad514cd4c1c16966ba9405d
SHA2564cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72
SHA512c8ba33d3b1b38cfbf3aac1eacdec4f92fb612fdd4f1358bcc8e58553666ddea06a8323d6048407c4506d547a8a3ae208a3f1e9477b770c683bfd4b551534bb3e
-
Filesize
41KB
MD571f5acf3d04df2bb0311ab2a46e3547a
SHA1aa8f6a8925912b439ad514cd4c1c16966ba9405d
SHA2564cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72
SHA512c8ba33d3b1b38cfbf3aac1eacdec4f92fb612fdd4f1358bcc8e58553666ddea06a8323d6048407c4506d547a8a3ae208a3f1e9477b770c683bfd4b551534bb3e
-
Filesize
41KB
MD571f5acf3d04df2bb0311ab2a46e3547a
SHA1aa8f6a8925912b439ad514cd4c1c16966ba9405d
SHA2564cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72
SHA512c8ba33d3b1b38cfbf3aac1eacdec4f92fb612fdd4f1358bcc8e58553666ddea06a8323d6048407c4506d547a8a3ae208a3f1e9477b770c683bfd4b551534bb3e