Analysis
-
max time kernel
62s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10/10/2022, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe
Resource
win7-20220812-en
General
-
Target
cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe
-
Size
832KB
-
MD5
488a92e53724b14f114bf642ef01a598
-
SHA1
4ade82db0e3762a754df784e1174741776b77b79
-
SHA256
cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0
-
SHA512
c7b37e61fc3604c3079725c48e437cb2128fabf0ad13fd6b6a2163def410c6f56461457cbfe811ba22ffdf393228dc5cd13ba6c36a58ad3daada6d1d5bad33af
-
SSDEEP
12288:Of5dQ0pNedvv+JlebXrI1/J+YDQ4XXA0BOp9DIXZzRb:Of56AoWke+H4XwaO8X
Malware Config
Extracted
formbook
8awd
py09MqOp96q6/h3QscX4tW3iC7Zc
Tz1RED2uEMHX5bExDz09Jqi/Dp0H80+R
8zT8gjNx3p7wuIME
ZPsM5CNczTg0hpxQMjVpXNviC7Zc
+5mhjcAHMLXwuIME
SlXLkzt83EG+XgMB
49P3teQlh8kXa0EBktUPoJ1H
BX4jXQd5qd4zzA==
6oy60lNViBATLADLf5md
2fFyLfZggXpyxA==
UBko+iEvcbAMyMliSy08HRT1udo=
uVl5kv1HcfxOn10=
NdJzr7kWDsC/
LoQwD70XbJ2y3qZcI8rHtHniC7Zc
SdTk6XN+x36YxLqqX1CdcQ==
bshYGLil02pvusAUqm2ndw==
eP8PQhhsCPs00FjNsIOpWxT1udo=
Ya5AGLWc4IbcVpnLf5md
Q8G/i732kjY+XpzLf5md
ioWvTFWx9KLwuIME
UH4aDOkkb2XKZWETynk=
wJmhYqnJ8hggZO5yZjV1ThT1udo=
ZKErEBuBCQ9nCvbckRJMK63qV8uGNwk=
39P6tdcNb67ka42DIkJdYA==
YXmbNkC5Tjm444UT
+tThptEjnZ71fxsJ5xci9Ju4ALKhZCXxHg==
5TPDrcEllYzdZK+0p+2WRBT1udo=
L0O8VEFHlC5/GQzLf5md
E6CGumvHhsdXpl8=
qsliaILxenp+riISy3s=
vEt0hAkVZAx6Iw/Lf5md
YkxwZOkWDsC/
tXOMPQ3Cqd4zzA==
LAssG5uh8ssNpjHcwDZGG5O/eu5KDl2X
pqfSdU2KAHGnsYIG
a/Xstv0mWZjPYFjd1fwMsmviC7Zc
9Vnoc+72SAkXLgTLf5md
XQstMrQXmsdXpl8=
ZZ5o3CeOyA0MO305iL4Pvn5wKp56AQ==
FUfTmkl9qd4zzA==
wyknCEt9mJeVrCISy3s=
lgwE+Jn1YC6444UT
aJUp+tXnD/UtgUsC8Q==
nnaJSofSOI6Vtn8rl4SX
B9XOYGhmqN7tEsp4Vy7qmQ5J
1l5yZOkWDsC/
Bh0+7NUft74Zi0sH5YjjpSk=
cDc0ydZRt3KpSMQwqm2ndw==
FFsA3KkJBLXwuIME
ijxkfxt5yv4SMrbivnE=
Hej4yQpBsiRxBgXLf5md
h72aZF5htMdXpl8=
FXMKzl1atWqApNqXSYP6nY9B
sy7acOUWDsC/
XQMiTyZJgywjLQPLf5md
rKXfsuojmC9DXZ/Lf5md
lr5kclGIMGuj8q2Gczt7UhT1udo=
75H2oGLKiMdXpl8=
jbZUOf7fMXWr9LuINCRvPstiKQ==
oumIXQZHsGGkQs+LYv0sIRT1udo=
ISFP4KFGvsAdvk4Cqm2ndw==
fdd4Serd2dkezg==
8AUt8h97qd4zzA==
r9WDnX2yKgdbsgkA9Bg9MKznEvbxYXuZ
negocioendigital.com
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1628 set thread context of 1812 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1272 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 1812 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 1180 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe Token: SeDebugPrivilege 1180 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1180 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 26 PID 1628 wrote to memory of 1180 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 26 PID 1628 wrote to memory of 1180 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 26 PID 1628 wrote to memory of 1180 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 26 PID 1628 wrote to memory of 1272 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 28 PID 1628 wrote to memory of 1272 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 28 PID 1628 wrote to memory of 1272 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 28 PID 1628 wrote to memory of 1272 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 28 PID 1628 wrote to memory of 896 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 30 PID 1628 wrote to memory of 896 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 30 PID 1628 wrote to memory of 896 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 30 PID 1628 wrote to memory of 896 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 30 PID 1628 wrote to memory of 1812 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 31 PID 1628 wrote to memory of 1812 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 31 PID 1628 wrote to memory of 1812 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 31 PID 1628 wrote to memory of 1812 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 31 PID 1628 wrote to memory of 1812 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 31 PID 1628 wrote to memory of 1812 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 31 PID 1628 wrote to memory of 1812 1628 cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe"C:\Users\Admin\AppData\Local\Temp\cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mWXyHZOFFcR.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mWXyHZOFFcR" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2C11.tmp"2⤵
- Creates scheduled task(s)
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe"C:\Users\Admin\AppData\Local\Temp\cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe"2⤵PID:896
-
-
C:\Users\Admin\AppData\Local\Temp\cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe"C:\Users\Admin\AppData\Local\Temp\cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a7ef20476056ed45f36278c164bcbe6e
SHA170eaba8c9f0c97284b43be8ac6ffc04a1a798678
SHA256449f04c504a3d516ed428cacf767ea9b80c89c255fc10c9346e79c38814b882a
SHA5129fc5b2e9dc0591d8c85d96d095699db2fb1e5eb77d65f1fcfedaf978914d90697c1fa988fa92126284a005d6b17946aad3347402ef8c4834c8d07eb4171e2cc4