Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce.exe
Resource
win10v2004-20220812-en
General
-
Target
de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce.exe
-
Size
515KB
-
MD5
705266ed3239bffa0c8d1151ce90c31a
-
SHA1
258622f7e12490a7d673d38db88f1451f9836f48
-
SHA256
de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce
-
SHA512
d808f8b6112973d4c971241d7a3a450333fc841971284b9299589892e4c15a7df8b0306b3a820f40e8c31e1f2259ecb0cf028bfdf98e2a9725c9cbec4b591cdd
-
SSDEEP
3072:LcVukQkymQ+NJ9JBJYCg1EVhVSVM77hDBooMs8oy0kQz9+gz80ZF9jCBNsB0VB2w:CJQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1784 aloai.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1544 netsh.exe -
Loads dropped DLL 2 IoCs
pid Process 2012 de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce.exe 2012 de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\976c75245cb447b9f804f2d14e8cc66f = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\aloai.exe\" .." aloai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\976c75245cb447b9f804f2d14e8cc66f = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\aloai.exe\" .." aloai.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe 1784 aloai.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1784 aloai.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1784 2012 de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce.exe 28 PID 2012 wrote to memory of 1784 2012 de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce.exe 28 PID 2012 wrote to memory of 1784 2012 de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce.exe 28 PID 2012 wrote to memory of 1784 2012 de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce.exe 28 PID 1784 wrote to memory of 1544 1784 aloai.exe 29 PID 1784 wrote to memory of 1544 1784 aloai.exe 29 PID 1784 wrote to memory of 1544 1784 aloai.exe 29 PID 1784 wrote to memory of 1544 1784 aloai.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce.exe"C:\Users\Admin\AppData\Local\Temp\de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\aloai.exe"C:\Users\Admin\AppData\Local\Temp\aloai.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\aloai.exe" "aloai.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1544
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515KB
MD5705266ed3239bffa0c8d1151ce90c31a
SHA1258622f7e12490a7d673d38db88f1451f9836f48
SHA256de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce
SHA512d808f8b6112973d4c971241d7a3a450333fc841971284b9299589892e4c15a7df8b0306b3a820f40e8c31e1f2259ecb0cf028bfdf98e2a9725c9cbec4b591cdd
-
Filesize
515KB
MD5705266ed3239bffa0c8d1151ce90c31a
SHA1258622f7e12490a7d673d38db88f1451f9836f48
SHA256de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce
SHA512d808f8b6112973d4c971241d7a3a450333fc841971284b9299589892e4c15a7df8b0306b3a820f40e8c31e1f2259ecb0cf028bfdf98e2a9725c9cbec4b591cdd
-
Filesize
515KB
MD5705266ed3239bffa0c8d1151ce90c31a
SHA1258622f7e12490a7d673d38db88f1451f9836f48
SHA256de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce
SHA512d808f8b6112973d4c971241d7a3a450333fc841971284b9299589892e4c15a7df8b0306b3a820f40e8c31e1f2259ecb0cf028bfdf98e2a9725c9cbec4b591cdd
-
Filesize
515KB
MD5705266ed3239bffa0c8d1151ce90c31a
SHA1258622f7e12490a7d673d38db88f1451f9836f48
SHA256de076e8d8bc8ac8d88520e71e5d1b1d2e3a07350e0736cfa2009929426c3a2ce
SHA512d808f8b6112973d4c971241d7a3a450333fc841971284b9299589892e4c15a7df8b0306b3a820f40e8c31e1f2259ecb0cf028bfdf98e2a9725c9cbec4b591cdd