Analysis
-
max time kernel
46s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe
Resource
win10v2004-20220812-en
General
-
Target
042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe
-
Size
275KB
-
MD5
42a4b1596ea0cde4a66df85dcf0ca670
-
SHA1
5f61b3e389469047e03b5d5a4688207df0c4e935
-
SHA256
042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683
-
SHA512
93fed74f57f441813016e9189354b397dcf54b170e378a98bd4be8d7a6af5a89c55404855fb102de32ee318bd681174b6e4da622607d891684080c3df00453f5
-
SSDEEP
6144:Ee34Tc3UvfVN20OokSla3DoW/x0ESExlHfipoSmHqC:SckXB7lazoy2E3HqpoSmP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 setup.exe -
resource yara_rule behavioral1/files/0x000a0000000122f7-58.dat upx behavioral1/memory/1780-59-0x0000000002530000-0x00000000025DC000-memory.dmp upx behavioral1/files/0x000a0000000122f7-61.dat upx behavioral1/files/0x000a0000000122f7-62.dat upx behavioral1/memory/2028-63-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral1/files/0x000a0000000122f7-65.dat upx behavioral1/files/0x000a0000000122f7-66.dat upx behavioral1/files/0x000a0000000122f7-67.dat upx behavioral1/memory/2028-69-0x0000000000400000-0x00000000004AC000-memory.dmp upx -
Loads dropped DLL 7 IoCs
pid Process 1780 042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe 1780 042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe 1780 042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe 1780 042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe 2028 setup.exe 2028 setup.exe 2028 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1816 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1816 AUDIODG.EXE Token: 33 1816 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1816 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1780 wrote to memory of 2028 1780 042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe 28 PID 1780 wrote to memory of 2028 1780 042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe 28 PID 1780 wrote to memory of 2028 1780 042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe 28 PID 1780 wrote to memory of 2028 1780 042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe 28 PID 1780 wrote to memory of 2028 1780 042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe 28 PID 1780 wrote to memory of 2028 1780 042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe 28 PID 1780 wrote to memory of 2028 1780 042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe"C:\Users\Admin\AppData\Local\Temp\042ae29dafa25141d02d152f9b6779897f4abd31c7f6b0bb7c0352e4a6c58683.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\nsj45AA.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\nsj45AA.tmp\setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2028
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4c81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD52ad744237a1d5ca25b671862cb9961b9
SHA1082354a70a7643a94e76c581e144b38fbfbbf851
SHA256b066ac24f918a0a981018c5050808b2095303552f09cce574ef08118667f3276
SHA5128fa8091d528a53481d2f52f49813821da7b6e1fc63e2523028cf929a25d77fb5854b25c6af7cc05109d03fc059d8328b3be56b019e00fefb83e4b4abb7ba333e
-
Filesize
199KB
MD52ad744237a1d5ca25b671862cb9961b9
SHA1082354a70a7643a94e76c581e144b38fbfbbf851
SHA256b066ac24f918a0a981018c5050808b2095303552f09cce574ef08118667f3276
SHA5128fa8091d528a53481d2f52f49813821da7b6e1fc63e2523028cf929a25d77fb5854b25c6af7cc05109d03fc059d8328b3be56b019e00fefb83e4b4abb7ba333e
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
199KB
MD52ad744237a1d5ca25b671862cb9961b9
SHA1082354a70a7643a94e76c581e144b38fbfbbf851
SHA256b066ac24f918a0a981018c5050808b2095303552f09cce574ef08118667f3276
SHA5128fa8091d528a53481d2f52f49813821da7b6e1fc63e2523028cf929a25d77fb5854b25c6af7cc05109d03fc059d8328b3be56b019e00fefb83e4b4abb7ba333e
-
Filesize
199KB
MD52ad744237a1d5ca25b671862cb9961b9
SHA1082354a70a7643a94e76c581e144b38fbfbbf851
SHA256b066ac24f918a0a981018c5050808b2095303552f09cce574ef08118667f3276
SHA5128fa8091d528a53481d2f52f49813821da7b6e1fc63e2523028cf929a25d77fb5854b25c6af7cc05109d03fc059d8328b3be56b019e00fefb83e4b4abb7ba333e
-
Filesize
199KB
MD52ad744237a1d5ca25b671862cb9961b9
SHA1082354a70a7643a94e76c581e144b38fbfbbf851
SHA256b066ac24f918a0a981018c5050808b2095303552f09cce574ef08118667f3276
SHA5128fa8091d528a53481d2f52f49813821da7b6e1fc63e2523028cf929a25d77fb5854b25c6af7cc05109d03fc059d8328b3be56b019e00fefb83e4b4abb7ba333e
-
Filesize
199KB
MD52ad744237a1d5ca25b671862cb9961b9
SHA1082354a70a7643a94e76c581e144b38fbfbbf851
SHA256b066ac24f918a0a981018c5050808b2095303552f09cce574ef08118667f3276
SHA5128fa8091d528a53481d2f52f49813821da7b6e1fc63e2523028cf929a25d77fb5854b25c6af7cc05109d03fc059d8328b3be56b019e00fefb83e4b4abb7ba333e