Analysis
-
max time kernel
45s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 03:15
Behavioral task
behavioral1
Sample
f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe
Resource
win10v2004-20220812-en
General
-
Target
f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe
-
Size
1.6MB
-
MD5
642350a939ff8aa8ecea090f8221ac20
-
SHA1
b4c893ad3ddf50ebd8d98f3c53e615d946fc866f
-
SHA256
f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b
-
SHA512
f548cd2ff623106797b655964dd105bd06e464eea9a59bd388245d4b743176012e1dcd0e3df9f7ed9759c5a6d8fadc736815539156544331a972d7da9b4d645e
-
SSDEEP
24576:udZe+jWVZNqWDS/bgpunWA+75j69cuHst5aKf+PuG8IIi4hZphbyc:uH+PoWDUgzhu9cuMt4vTaiqZe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ServerMinecraft.exepid process 1280 ServerMinecraft.exe -
Loads dropped DLL 2 IoCs
Processes:
f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exedw20.exepid process 1648 f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe 1480 dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 1984 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 1984 vlc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
AUDIODG.EXEvlc.exedescription pid process Token: 33 1688 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1688 AUDIODG.EXE Token: 33 1688 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1688 AUDIODG.EXE Token: 33 1984 vlc.exe Token: SeIncBasePriorityPrivilege 1984 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
vlc.exepid process 1984 vlc.exe 1984 vlc.exe 1984 vlc.exe 1984 vlc.exe 1984 vlc.exe 1984 vlc.exe 1984 vlc.exe 1984 vlc.exe 1984 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
vlc.exepid process 1984 vlc.exe 1984 vlc.exe 1984 vlc.exe 1984 vlc.exe 1984 vlc.exe 1984 vlc.exe 1984 vlc.exe 1984 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 1984 vlc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exeServerMinecraft.exedescription pid process target process PID 1648 wrote to memory of 1280 1648 f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe ServerMinecraft.exe PID 1648 wrote to memory of 1280 1648 f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe ServerMinecraft.exe PID 1648 wrote to memory of 1280 1648 f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe ServerMinecraft.exe PID 1648 wrote to memory of 1280 1648 f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe ServerMinecraft.exe PID 1648 wrote to memory of 1984 1648 f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe vlc.exe PID 1648 wrote to memory of 1984 1648 f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe vlc.exe PID 1648 wrote to memory of 1984 1648 f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe vlc.exe PID 1648 wrote to memory of 1984 1648 f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe vlc.exe PID 1280 wrote to memory of 1480 1280 ServerMinecraft.exe dw20.exe PID 1280 wrote to memory of 1480 1280 ServerMinecraft.exe dw20.exe PID 1280 wrote to memory of 1480 1280 ServerMinecraft.exe dw20.exe PID 1280 wrote to memory of 1480 1280 ServerMinecraft.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe"C:\Users\Admin\AppData\Local\Temp\f2acfb304c1a01d708a90d1c7a707562b80379d0f189e39c786ada78ccebbd7b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ServerMinecraft.exe"C:\Users\Admin\AppData\Local\Temp\ServerMinecraft.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 3963⤵
- Loads dropped DLL
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\ÊæÒíä.mp3"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5701⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ServerMinecraft.exeFilesize
49KB
MD50778cbc7e472f450c2bf8855719b5ca4
SHA1dbc48c862eb6dfddc9007d246a64c1e11b063969
SHA25628cd0ae4cfe7a50d75e5e866d36a4c174065407f24e23c7c631bc130f80b288d
SHA512c964b46d8a033eed5dc85a6e6f55f51c7e07088121b0bd4ab69a3b83593473e528c3aef8286b8b7f5add14435c307d92fdd08d2c09188541132aa6f57d70873d
-
C:\Users\Admin\AppData\Local\Temp\ServerMinecraft.exeFilesize
49KB
MD50778cbc7e472f450c2bf8855719b5ca4
SHA1dbc48c862eb6dfddc9007d246a64c1e11b063969
SHA25628cd0ae4cfe7a50d75e5e866d36a4c174065407f24e23c7c631bc130f80b288d
SHA512c964b46d8a033eed5dc85a6e6f55f51c7e07088121b0bd4ab69a3b83593473e528c3aef8286b8b7f5add14435c307d92fdd08d2c09188541132aa6f57d70873d
-
C:\Users\Admin\AppData\Local\Temp\ÊæÒíä.mp3Filesize
1.4MB
MD589b73a34ea5634807f5b7c36e9ed3755
SHA101a12b8ca66adb5000a1dc3f23e64fe521a5f154
SHA25676e673f5161952de32688c1bd59c0ec2cc84475d8cc790c38be1056057e09a77
SHA512ce0ed525b2c6b454ac8477c6c963532f97434bf29881f136312106b4631fa331e3142bfbfe62d8cba63b8cdcd886d617391fe89ceb8df84cf9aec3056c1cd3d4
-
\Users\Admin\AppData\Local\Temp\ServerMinecraft.exeFilesize
49KB
MD50778cbc7e472f450c2bf8855719b5ca4
SHA1dbc48c862eb6dfddc9007d246a64c1e11b063969
SHA25628cd0ae4cfe7a50d75e5e866d36a4c174065407f24e23c7c631bc130f80b288d
SHA512c964b46d8a033eed5dc85a6e6f55f51c7e07088121b0bd4ab69a3b83593473e528c3aef8286b8b7f5add14435c307d92fdd08d2c09188541132aa6f57d70873d
-
\Users\Admin\AppData\Local\Temp\ServerMinecraft.exeFilesize
49KB
MD50778cbc7e472f450c2bf8855719b5ca4
SHA1dbc48c862eb6dfddc9007d246a64c1e11b063969
SHA25628cd0ae4cfe7a50d75e5e866d36a4c174065407f24e23c7c631bc130f80b288d
SHA512c964b46d8a033eed5dc85a6e6f55f51c7e07088121b0bd4ab69a3b83593473e528c3aef8286b8b7f5add14435c307d92fdd08d2c09188541132aa6f57d70873d
-
memory/1280-56-0x0000000000000000-mapping.dmp
-
memory/1280-66-0x00000000744D0000-0x0000000074A7B000-memory.dmpFilesize
5.7MB
-
memory/1280-67-0x00000000744D0000-0x0000000074A7B000-memory.dmpFilesize
5.7MB
-
memory/1480-61-0x0000000000000000-mapping.dmp
-
memory/1648-54-0x0000000076121000-0x0000000076123000-memory.dmpFilesize
8KB
-
memory/1984-59-0x0000000000000000-mapping.dmp
-
memory/1984-62-0x000007FEFBD81000-0x000007FEFBD83000-memory.dmpFilesize
8KB