Analysis
-
max time kernel
157s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 03:38
Static task
static1
Behavioral task
behavioral1
Sample
47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe
Resource
win10v2004-20220901-en
General
-
Target
47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe
-
Size
629KB
-
MD5
450060ccd8b9d7d412c94d95633543e1
-
SHA1
7e1c2de473b6d376799651f14280f4f8ad3ce8fb
-
SHA256
47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9
-
SHA512
4603f28974a45fe05d9df6c1e98a9ab48f0d6a012c1c842bc2535878609f988f20273b5d5de52216d177daf27c7282822eafcfa1780168d2bf0fe27767edd41b
-
SSDEEP
12288:2N+LbOurqW8AuLexBtRDgNCrrxHeGCcOHO:FOurqW8AuL8fD4CrrsGCcaO
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1556 explorer.exe 1708 explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 1188 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 1188 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\explorer.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: explorer.exe File opened (read-only) \??\T: explorer.exe File opened (read-only) \??\V: explorer.exe File opened (read-only) \??\W: explorer.exe File opened (read-only) \??\G: explorer.exe File opened (read-only) \??\I: explorer.exe File opened (read-only) \??\K: explorer.exe File opened (read-only) \??\R: explorer.exe File opened (read-only) \??\Z: explorer.exe File opened (read-only) \??\H: explorer.exe File opened (read-only) \??\N: explorer.exe File opened (read-only) \??\P: explorer.exe File opened (read-only) \??\X: explorer.exe File opened (read-only) \??\Y: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\L: explorer.exe File opened (read-only) \??\O: explorer.exe File opened (read-only) \??\U: explorer.exe File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\J: explorer.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\Q: explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1652 set thread context of 1188 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 27 PID 1556 set thread context of 1708 1556 explorer.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 1556 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1188 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 27 PID 1652 wrote to memory of 1188 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 27 PID 1652 wrote to memory of 1188 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 27 PID 1652 wrote to memory of 1188 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 27 PID 1652 wrote to memory of 1188 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 27 PID 1652 wrote to memory of 1188 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 27 PID 1652 wrote to memory of 1188 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 27 PID 1652 wrote to memory of 1188 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 27 PID 1652 wrote to memory of 1188 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 27 PID 1652 wrote to memory of 1188 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 27 PID 1652 wrote to memory of 1188 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 27 PID 1652 wrote to memory of 1188 1652 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 27 PID 1188 wrote to memory of 1556 1188 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 28 PID 1188 wrote to memory of 1556 1188 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 28 PID 1188 wrote to memory of 1556 1188 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 28 PID 1188 wrote to memory of 1556 1188 47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe 28 PID 1556 wrote to memory of 1708 1556 explorer.exe 29 PID 1556 wrote to memory of 1708 1556 explorer.exe 29 PID 1556 wrote to memory of 1708 1556 explorer.exe 29 PID 1556 wrote to memory of 1708 1556 explorer.exe 29 PID 1556 wrote to memory of 1708 1556 explorer.exe 29 PID 1556 wrote to memory of 1708 1556 explorer.exe 29 PID 1556 wrote to memory of 1708 1556 explorer.exe 29 PID 1556 wrote to memory of 1708 1556 explorer.exe 29 PID 1556 wrote to memory of 1708 1556 explorer.exe 29 PID 1556 wrote to memory of 1708 1556 explorer.exe 29 PID 1556 wrote to memory of 1708 1556 explorer.exe 29 PID 1556 wrote to memory of 1708 1556 explorer.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe"C:\Users\Admin\AppData\Local\Temp\47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe"C:\Users\Admin\AppData\Local\Temp\47857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
PID:1708
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
629KB
MD5450060ccd8b9d7d412c94d95633543e1
SHA17e1c2de473b6d376799651f14280f4f8ad3ce8fb
SHA25647857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9
SHA5124603f28974a45fe05d9df6c1e98a9ab48f0d6a012c1c842bc2535878609f988f20273b5d5de52216d177daf27c7282822eafcfa1780168d2bf0fe27767edd41b
-
Filesize
629KB
MD5450060ccd8b9d7d412c94d95633543e1
SHA17e1c2de473b6d376799651f14280f4f8ad3ce8fb
SHA25647857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9
SHA5124603f28974a45fe05d9df6c1e98a9ab48f0d6a012c1c842bc2535878609f988f20273b5d5de52216d177daf27c7282822eafcfa1780168d2bf0fe27767edd41b
-
Filesize
629KB
MD5450060ccd8b9d7d412c94d95633543e1
SHA17e1c2de473b6d376799651f14280f4f8ad3ce8fb
SHA25647857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9
SHA5124603f28974a45fe05d9df6c1e98a9ab48f0d6a012c1c842bc2535878609f988f20273b5d5de52216d177daf27c7282822eafcfa1780168d2bf0fe27767edd41b
-
Filesize
629KB
MD5450060ccd8b9d7d412c94d95633543e1
SHA17e1c2de473b6d376799651f14280f4f8ad3ce8fb
SHA25647857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9
SHA5124603f28974a45fe05d9df6c1e98a9ab48f0d6a012c1c842bc2535878609f988f20273b5d5de52216d177daf27c7282822eafcfa1780168d2bf0fe27767edd41b
-
Filesize
629KB
MD5450060ccd8b9d7d412c94d95633543e1
SHA17e1c2de473b6d376799651f14280f4f8ad3ce8fb
SHA25647857977c75e866d76bd0bfc27d9c46f73376be05c01199b48c105919d4c8ff9
SHA5124603f28974a45fe05d9df6c1e98a9ab48f0d6a012c1c842bc2535878609f988f20273b5d5de52216d177daf27c7282822eafcfa1780168d2bf0fe27767edd41b