Analysis
-
max time kernel
126s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 08:03
Behavioral task
behavioral1
Sample
261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe
Resource
win10v2004-20220812-en
General
-
Target
261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe
-
Size
608KB
-
MD5
70c5133b811f507be0eb5602ccdc9320
-
SHA1
d1a0e0a6cd8c93936d31fb2c2d310b1fe0bf44bb
-
SHA256
261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3
-
SHA512
3f99b5b2420930cbb5b0b14830d421e2eb50b3d93807d12c278e98cefde0a4f22fae80bbe2b340481148c690d7bc88df8ee1ea71c3aa5183b9008c51d5d1c518
-
SSDEEP
6144:MVY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bco2KWw:MgDhdkq5BCoC5LfWSLTUQpr2Zu19Q3w
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe IEXPLORER.exe" 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral2/memory/512-132-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/512-137-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/512-138-0x0000000000400000-0x000000000049D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\IEXPLORER.exe" 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/512-132-0x0000000000400000-0x000000000049D000-memory.dmp autoit_exe behavioral2/memory/512-137-0x0000000000400000-0x000000000049D000-memory.dmp autoit_exe behavioral2/memory/512-138-0x0000000000400000-0x000000000049D000-memory.dmp autoit_exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\IEXPLORER.exe 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe File created C:\Windows\SysWOW64\WORD.exe 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe File opened for modification C:\Windows\SysWOW64\WORD.exe 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe File opened for modification C:\Windows\SysWOW64\autorun.ini 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\IEXPLORER.exe 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe File opened for modification C:\Windows\IEXPLORER.exe 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe File created C:\Windows\setting.ini 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 512 wrote to memory of 3360 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 81 PID 512 wrote to memory of 3360 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 81 PID 512 wrote to memory of 3360 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 81 PID 3360 wrote to memory of 4868 3360 cmd.exe 83 PID 3360 wrote to memory of 4868 3360 cmd.exe 83 PID 3360 wrote to memory of 4868 3360 cmd.exe 83 PID 512 wrote to memory of 1820 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 84 PID 512 wrote to memory of 1820 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 84 PID 512 wrote to memory of 1820 512 261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe 84 PID 1820 wrote to memory of 3496 1820 cmd.exe 86 PID 1820 wrote to memory of 3496 1820 cmd.exe 86 PID 1820 wrote to memory of 3496 1820 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe"C:\Users\Admin\AppData\Local\Temp\261ebe49a3dfaa434c3cb2cd67c39b1b77cb7cfb6e4a7d502b118bc2cc67f6a3.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:4868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe3⤵PID:3496
-
-