Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
8cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef.exe
Resource
win10v2004-20220901-en
General
-
Target
8cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef.exe
-
Size
90KB
-
MD5
6d45dd17326c2734179608450c37e6c0
-
SHA1
6c5f2f9ca2affc703a40cfbc64aa064e68ca7515
-
SHA256
8cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef
-
SHA512
bd2694fa1c267c105a62ae58ecc8012115d66ea5722fdb5c3b68894058a42ca7f61d8df177ebd73895b042fe0b6f841581c1586283091b0755e830237afa42ca
-
SSDEEP
1536:oeB1IzDMEfOf2NK1zLZEGGlIg57ur+R7LdtlKDt2/CPj6/xG:dBeGf2NUZEGMqrWK4qz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1136 system.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2036 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\12ce4e06a81e8d54fd01d9b762f1b1bb.exe system.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\12ce4e06a81e8d54fd01d9b762f1b1bb.exe system.exe -
Loads dropped DLL 2 IoCs
pid Process 1436 8cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef.exe 1436 8cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\12ce4e06a81e8d54fd01d9b762f1b1bb = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\system.exe\" .." system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\12ce4e06a81e8d54fd01d9b762f1b1bb = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\system.exe\" .." system.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1136 system.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1136 system.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1436 wrote to memory of 1136 1436 8cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef.exe 27 PID 1436 wrote to memory of 1136 1436 8cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef.exe 27 PID 1436 wrote to memory of 1136 1436 8cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef.exe 27 PID 1436 wrote to memory of 1136 1436 8cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef.exe 27 PID 1136 wrote to memory of 2036 1136 system.exe 28 PID 1136 wrote to memory of 2036 1136 system.exe 28 PID 1136 wrote to memory of 2036 1136 system.exe 28 PID 1136 wrote to memory of 2036 1136 system.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef.exe"C:\Users\Admin\AppData\Local\Temp\8cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\system.exe"C:\Users\Admin\AppData\Local\Temp\system.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\system.exe" "system.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2036
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD56d45dd17326c2734179608450c37e6c0
SHA16c5f2f9ca2affc703a40cfbc64aa064e68ca7515
SHA2568cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef
SHA512bd2694fa1c267c105a62ae58ecc8012115d66ea5722fdb5c3b68894058a42ca7f61d8df177ebd73895b042fe0b6f841581c1586283091b0755e830237afa42ca
-
Filesize
90KB
MD56d45dd17326c2734179608450c37e6c0
SHA16c5f2f9ca2affc703a40cfbc64aa064e68ca7515
SHA2568cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef
SHA512bd2694fa1c267c105a62ae58ecc8012115d66ea5722fdb5c3b68894058a42ca7f61d8df177ebd73895b042fe0b6f841581c1586283091b0755e830237afa42ca
-
Filesize
90KB
MD56d45dd17326c2734179608450c37e6c0
SHA16c5f2f9ca2affc703a40cfbc64aa064e68ca7515
SHA2568cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef
SHA512bd2694fa1c267c105a62ae58ecc8012115d66ea5722fdb5c3b68894058a42ca7f61d8df177ebd73895b042fe0b6f841581c1586283091b0755e830237afa42ca
-
Filesize
90KB
MD56d45dd17326c2734179608450c37e6c0
SHA16c5f2f9ca2affc703a40cfbc64aa064e68ca7515
SHA2568cc8893d2b59b905d33596bef5263acf2de12b5e9105ab42661d222189b4d2ef
SHA512bd2694fa1c267c105a62ae58ecc8012115d66ea5722fdb5c3b68894058a42ca7f61d8df177ebd73895b042fe0b6f841581c1586283091b0755e830237afa42ca