Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe
Resource
win10v2004-20220812-en
General
-
Target
add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe
-
Size
736KB
-
MD5
34b5edde1d966df3661f783489d006f0
-
SHA1
274af47f875010e7feacf3a9cc0aa37688bb9f0b
-
SHA256
add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1
-
SHA512
8ea054b133145a337183263946e0ab2951afbecc9c8eccea830a5fd00bee59b03ecbcd53b4c8b81903b0c6720b4d9472c372e361f366c5f89c7a936f31f7a4b9
-
SSDEEP
6144:dC4umWphVf4j27zo1cvJTDEpULgU8L94jDV9U1woU8LSHP0x8Taj97:H9WphJx7k0DEpUE9QDV9U11Sa
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sychost.exe" add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinIcons = "C:\\Windows\\system32\\winicons.exe" reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\sychost.exe add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe File created C:\Windows\SysWOW64\winicons.exe add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe File opened for modification C:\Windows\SysWOW64\winicons.exe add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\History.txt add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe File opened for modification C:\Program Files\7-Zip\7z.exe add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe File opened for modification C:\Program Files\7-Zip\7zG.exe add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1396 add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe 1396 add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe 1396 add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe 1396 add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1628 1396 add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe 27 PID 1396 wrote to memory of 1628 1396 add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe 27 PID 1396 wrote to memory of 1628 1396 add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe 27 PID 1396 wrote to memory of 1628 1396 add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe 27 PID 1628 wrote to memory of 568 1628 cmd.exe 29 PID 1628 wrote to memory of 568 1628 cmd.exe 29 PID 1628 wrote to memory of 568 1628 cmd.exe 29 PID 1628 wrote to memory of 568 1628 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe"C:\Users\Admin\AppData\Local\Temp\add304b4d899b58766d0343c177527b60c03a31ba1cbdffd9d6701ec15ea15c1.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v WinIcons /t REG_SZ /d C:\Windows\system32\winicons.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v WinIcons /t REG_SZ /d C:\Windows\system32\winicons.exe /f3⤵
- Adds Run key to start application
PID:568
-
-