Analysis
-
max time kernel
42s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe
Resource
win10v2004-20220812-en
General
-
Target
7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe
-
Size
258KB
-
MD5
ffb863cbf57cf76123e8a42155202f06
-
SHA1
57b17f2c5889177c96fc8ad452c6cff7dbd0a640
-
SHA256
7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7
-
SHA512
7befec3571e65749063058f501fbcef660c8aad5f2472202a7b5b19702ae25f7424289fdeff0e0da4d92afecd1bdde17f6b3fd8ea1fd3ebbc9d37a270b61dfd0
-
SSDEEP
6144:u8U2qy6rRZb7jxGYnjiE9hDiPyyw/kyAwhcyqfQj4tfKs:wzy6rRxEAGPyyUdNcyqfDtj
Malware Config
Signatures
-
Drops file in Drivers directory 8 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hоsts 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe File opened for modification C:\Windows\System32\drivers\etc\hоsts 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe File created C:\Windows\System32\drivers\etc\start1.exe 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe File opened for modification C:\Windows\System32\drivers\etc\start1.exe 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe File created C:\Windows\System32\drivers\etc\file.exe 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe File opened for modification C:\Windows\System32\drivers\etc\file.exe 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe File created C:\Windows\System32\drivers\etc\__tmp_rar_sfx_access_check_7092725 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe -
Executes dropped EXE 1 IoCs
pid Process 1952 start1.exe -
resource yara_rule behavioral1/files/0x000900000001267a-55.dat upx behavioral1/files/0x000900000001267a-56.dat upx behavioral1/files/0x000900000001267a-58.dat upx behavioral1/memory/1952-61-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1708 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe 1708 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1952 start1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1952 1708 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe 28 PID 1708 wrote to memory of 1952 1708 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe 28 PID 1708 wrote to memory of 1952 1708 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe 28 PID 1708 wrote to memory of 1952 1708 7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe"C:\Users\Admin\AppData\Local\Temp\7c3255b419f6a79fb152ff7d8d5d020466948b2283f3c431a2e0439886be7af7.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\drivers\etc\start1.exe"C:\Windows\system32\drivers\etc\start1.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD59c0f625a4594f38dc0b5ed62e6d89e55
SHA1210fc783e2fcf3da9066e163e737a2bc1ac420a7
SHA256b0db9123657c85cb10676591e470dfe5f3e175f13f36641d563417d4362ddac5
SHA5128d3c3da4511ca7e557231ec40c5936bb6204608dbf17c85ab3ed5d28970a2b99903a495fab8ca9ce4be63650f527802937d03dfb6feaeca393c4e0dc1ec2103c
-
Filesize
139KB
MD59c0f625a4594f38dc0b5ed62e6d89e55
SHA1210fc783e2fcf3da9066e163e737a2bc1ac420a7
SHA256b0db9123657c85cb10676591e470dfe5f3e175f13f36641d563417d4362ddac5
SHA5128d3c3da4511ca7e557231ec40c5936bb6204608dbf17c85ab3ed5d28970a2b99903a495fab8ca9ce4be63650f527802937d03dfb6feaeca393c4e0dc1ec2103c
-
Filesize
139KB
MD59c0f625a4594f38dc0b5ed62e6d89e55
SHA1210fc783e2fcf3da9066e163e737a2bc1ac420a7
SHA256b0db9123657c85cb10676591e470dfe5f3e175f13f36641d563417d4362ddac5
SHA5128d3c3da4511ca7e557231ec40c5936bb6204608dbf17c85ab3ed5d28970a2b99903a495fab8ca9ce4be63650f527802937d03dfb6feaeca393c4e0dc1ec2103c