Analysis
-
max time kernel
33s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 16:16
Static task
static1
Behavioral task
behavioral1
Sample
17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe
Resource
win10v2004-20220812-en
General
-
Target
17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe
-
Size
88KB
-
MD5
5b5d924e1f57f965b630f76ca67a78e0
-
SHA1
558e3d39e536050f2096a70490cb15b8341c4525
-
SHA256
17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632
-
SHA512
20a0abf003823ff88221fe159d2a8ad713900fc9758f4c807c08109c016a9b717cd4df7f45ad7c55d72843bc1f72e49e89b9b4ff79dcd5c9e82aa780bcfd22e0
-
SSDEEP
1536:wbNrxkeaUMzYurxQhfvbKkQI3yMp1xP93AT4JR7YNUsEkEs01V:wxpMzYsdMp1xVQT4Tql01V
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1768 troyan7.exe -
Loads dropped DLL 5 IoCs
pid Process 1828 17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe 1828 17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1976 1768 WerFault.exe 27 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1416 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1828 17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1828 wrote to memory of 1768 1828 17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe 27 PID 1828 wrote to memory of 1768 1828 17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe 27 PID 1828 wrote to memory of 1768 1828 17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe 27 PID 1828 wrote to memory of 1768 1828 17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe 27 PID 1768 wrote to memory of 1976 1768 troyan7.exe 28 PID 1768 wrote to memory of 1976 1768 troyan7.exe 28 PID 1768 wrote to memory of 1976 1768 troyan7.exe 28 PID 1768 wrote to memory of 1976 1768 troyan7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe"C:\Users\Admin\AppData\Local\Temp\17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\troyan7.exe"C:\Users\Admin\AppData\Local\Temp\troyan7.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 363⤵
- Loads dropped DLL
- Program crash
PID:1976
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD51bc5b77f3e50b7fbe12c792ee438da45
SHA15bd2ef6030d665aa615147512a0fea3055930cc6
SHA256ea3b1238a38f72b330aac53364bd0a0481946b93fc757dde7314ce3319f1840e
SHA51262139dfa1f200687b847462c76ff4979c4892ecfe65ff5e8c06822ca771da3bd3db472aa8bdaa61b4ba359e493cf51882f9731e3fbfa2d496dac8cba03332905
-
Filesize
7KB
MD5284a47f6c479b9ad48204038527ab619
SHA133ec0d00cf5e6352a99688cb34353e59b7fae2cc
SHA256cd34f1cc2ce944e583c6bd642fab7aa8daf29ab97da848088cd3cec335d19034
SHA51294c7c03fc2538e96be5d7af31e848a829350f89f4ef29df489e1bc024ebbaf4d6390f56865c6780d2bee151d61cbb14bfc7fd0c37fb2ff002d78303e245808ff
-
Filesize
7KB
MD5284a47f6c479b9ad48204038527ab619
SHA133ec0d00cf5e6352a99688cb34353e59b7fae2cc
SHA256cd34f1cc2ce944e583c6bd642fab7aa8daf29ab97da848088cd3cec335d19034
SHA51294c7c03fc2538e96be5d7af31e848a829350f89f4ef29df489e1bc024ebbaf4d6390f56865c6780d2bee151d61cbb14bfc7fd0c37fb2ff002d78303e245808ff
-
Filesize
7KB
MD5284a47f6c479b9ad48204038527ab619
SHA133ec0d00cf5e6352a99688cb34353e59b7fae2cc
SHA256cd34f1cc2ce944e583c6bd642fab7aa8daf29ab97da848088cd3cec335d19034
SHA51294c7c03fc2538e96be5d7af31e848a829350f89f4ef29df489e1bc024ebbaf4d6390f56865c6780d2bee151d61cbb14bfc7fd0c37fb2ff002d78303e245808ff
-
Filesize
7KB
MD5284a47f6c479b9ad48204038527ab619
SHA133ec0d00cf5e6352a99688cb34353e59b7fae2cc
SHA256cd34f1cc2ce944e583c6bd642fab7aa8daf29ab97da848088cd3cec335d19034
SHA51294c7c03fc2538e96be5d7af31e848a829350f89f4ef29df489e1bc024ebbaf4d6390f56865c6780d2bee151d61cbb14bfc7fd0c37fb2ff002d78303e245808ff
-
Filesize
7KB
MD5284a47f6c479b9ad48204038527ab619
SHA133ec0d00cf5e6352a99688cb34353e59b7fae2cc
SHA256cd34f1cc2ce944e583c6bd642fab7aa8daf29ab97da848088cd3cec335d19034
SHA51294c7c03fc2538e96be5d7af31e848a829350f89f4ef29df489e1bc024ebbaf4d6390f56865c6780d2bee151d61cbb14bfc7fd0c37fb2ff002d78303e245808ff
-
Filesize
7KB
MD5284a47f6c479b9ad48204038527ab619
SHA133ec0d00cf5e6352a99688cb34353e59b7fae2cc
SHA256cd34f1cc2ce944e583c6bd642fab7aa8daf29ab97da848088cd3cec335d19034
SHA51294c7c03fc2538e96be5d7af31e848a829350f89f4ef29df489e1bc024ebbaf4d6390f56865c6780d2bee151d61cbb14bfc7fd0c37fb2ff002d78303e245808ff