Analysis
-
max time kernel
136s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe
Resource
win10v2004-20220812-en
General
-
Target
5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe
-
Size
286KB
-
MD5
9dadfc53bb6a731f4addecf7fe33897e
-
SHA1
cf05bc7ad0a13baf3890b19a9afbafc7cb0ac193
-
SHA256
5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096
-
SHA512
fffa823c000a2a0332981426b9978865aa41b3ebfa0902af971e935840297ef33a2a049b02f5234f564ca6d3a7ed9d6d6a419a309b8bd731ee5edc4163c45b28
-
SSDEEP
6144:XwaPq72adX5H9+nvDHzAV+VoT2de+QUAAL3cj539:Xwaa2epwvDHzOx4VB3YB9
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1376 Server_Setup.exe 1636 Hacker.com.cn.exe -
Loads dropped DLL 4 IoCs
pid Process 960 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe 1376 Server_Setup.exe 1376 Server_Setup.exe 1376 Server_Setup.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\program files\common files\microsoft shared\msinfo\Server_Setup.jpg 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe File opened for modification C:\program files\common files\microsoft shared\msinfo\Server_Setup.exe Server_Setup.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe Server_Setup.exe File opened for modification C:\Windows\Hacker.com.cn.exe Server_Setup.exe File created C:\Windows\uninstal.bat Server_Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1376 Server_Setup.exe Token: SeDebugPrivilege 1636 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 960 wrote to memory of 1376 960 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe 27 PID 960 wrote to memory of 1376 960 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe 27 PID 960 wrote to memory of 1376 960 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe 27 PID 960 wrote to memory of 1376 960 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe 27 PID 960 wrote to memory of 1376 960 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe 27 PID 960 wrote to memory of 1376 960 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe 27 PID 960 wrote to memory of 1376 960 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe 27 PID 1636 wrote to memory of 1804 1636 Hacker.com.cn.exe 29 PID 1636 wrote to memory of 1804 1636 Hacker.com.cn.exe 29 PID 1636 wrote to memory of 1804 1636 Hacker.com.cn.exe 29 PID 1636 wrote to memory of 1804 1636 Hacker.com.cn.exe 29 PID 1376 wrote to memory of 832 1376 Server_Setup.exe 30 PID 1376 wrote to memory of 832 1376 Server_Setup.exe 30 PID 1376 wrote to memory of 832 1376 Server_Setup.exe 30 PID 1376 wrote to memory of 832 1376 Server_Setup.exe 30 PID 1376 wrote to memory of 832 1376 Server_Setup.exe 30 PID 1376 wrote to memory of 832 1376 Server_Setup.exe 30 PID 1376 wrote to memory of 832 1376 Server_Setup.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe"C:\Users\Admin\AppData\Local\Temp\5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:960 -
C:\program files\common files\microsoft shared\msinfo\Server_Setup.exe"C:\program files\common files\microsoft shared\msinfo\Server_Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat3⤵PID:832
-
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD5282728e8cf879da1166c69804848fde4
SHA11106f1958cbf6ef9afa62490eb2ff27a774598a2
SHA2565cb27cad28849469ba50b8c62917c561f5dd5862e3aaef7cc1a23beb819b57db
SHA51268ca7afcbaae18a5af5a3e9b87b87eabe3c5f6ec97df427e048ea7b27117c3bc24d5b676d532616d0d046c705702f8776acb4118616598501fe452d70f1b29fa
-
Filesize
270KB
MD5282728e8cf879da1166c69804848fde4
SHA11106f1958cbf6ef9afa62490eb2ff27a774598a2
SHA2565cb27cad28849469ba50b8c62917c561f5dd5862e3aaef7cc1a23beb819b57db
SHA51268ca7afcbaae18a5af5a3e9b87b87eabe3c5f6ec97df427e048ea7b27117c3bc24d5b676d532616d0d046c705702f8776acb4118616598501fe452d70f1b29fa
-
Filesize
270KB
MD5282728e8cf879da1166c69804848fde4
SHA11106f1958cbf6ef9afa62490eb2ff27a774598a2
SHA2565cb27cad28849469ba50b8c62917c561f5dd5862e3aaef7cc1a23beb819b57db
SHA51268ca7afcbaae18a5af5a3e9b87b87eabe3c5f6ec97df427e048ea7b27117c3bc24d5b676d532616d0d046c705702f8776acb4118616598501fe452d70f1b29fa
-
Filesize
190B
MD5748359b8db32273bc6f3f4b050b8b86b
SHA1f30e73e970b4277fb39004b3b5833a79e6f4762d
SHA256bd92c1a1c66403d13d1da9143ce6d7db2a4dcbdee6bd58899174406407f7b803
SHA512e02ecbb038f1ff075201d551eddb74252b7fa4582b0c10cfdaedf3845e1997bf9e2cb8d2b8a55318fb9072d7b777cf53d9df348dec467160a9e8b7a794b4556d
-
Filesize
270KB
MD5282728e8cf879da1166c69804848fde4
SHA11106f1958cbf6ef9afa62490eb2ff27a774598a2
SHA2565cb27cad28849469ba50b8c62917c561f5dd5862e3aaef7cc1a23beb819b57db
SHA51268ca7afcbaae18a5af5a3e9b87b87eabe3c5f6ec97df427e048ea7b27117c3bc24d5b676d532616d0d046c705702f8776acb4118616598501fe452d70f1b29fa
-
Filesize
270KB
MD5282728e8cf879da1166c69804848fde4
SHA11106f1958cbf6ef9afa62490eb2ff27a774598a2
SHA2565cb27cad28849469ba50b8c62917c561f5dd5862e3aaef7cc1a23beb819b57db
SHA51268ca7afcbaae18a5af5a3e9b87b87eabe3c5f6ec97df427e048ea7b27117c3bc24d5b676d532616d0d046c705702f8776acb4118616598501fe452d70f1b29fa
-
Filesize
270KB
MD5282728e8cf879da1166c69804848fde4
SHA11106f1958cbf6ef9afa62490eb2ff27a774598a2
SHA2565cb27cad28849469ba50b8c62917c561f5dd5862e3aaef7cc1a23beb819b57db
SHA51268ca7afcbaae18a5af5a3e9b87b87eabe3c5f6ec97df427e048ea7b27117c3bc24d5b676d532616d0d046c705702f8776acb4118616598501fe452d70f1b29fa
-
Filesize
270KB
MD5282728e8cf879da1166c69804848fde4
SHA11106f1958cbf6ef9afa62490eb2ff27a774598a2
SHA2565cb27cad28849469ba50b8c62917c561f5dd5862e3aaef7cc1a23beb819b57db
SHA51268ca7afcbaae18a5af5a3e9b87b87eabe3c5f6ec97df427e048ea7b27117c3bc24d5b676d532616d0d046c705702f8776acb4118616598501fe452d70f1b29fa
-
Filesize
270KB
MD5282728e8cf879da1166c69804848fde4
SHA11106f1958cbf6ef9afa62490eb2ff27a774598a2
SHA2565cb27cad28849469ba50b8c62917c561f5dd5862e3aaef7cc1a23beb819b57db
SHA51268ca7afcbaae18a5af5a3e9b87b87eabe3c5f6ec97df427e048ea7b27117c3bc24d5b676d532616d0d046c705702f8776acb4118616598501fe452d70f1b29fa