Analysis
-
max time kernel
152s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 15:12
Static task
static1
Behavioral task
behavioral1
Sample
a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe
Resource
win10v2004-20220901-en
General
-
Target
a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe
-
Size
201KB
-
MD5
27689a3abc46a9541375d2fc11930376
-
SHA1
d28aa1818c54105d85e3c80cbee41da61e626846
-
SHA256
a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683
-
SHA512
d30a5f06f8c0becf42a45c0f9804cbba655372d908aa3c62b2f9b66932c719b35afcbb48035e4796bb2a7aae79ede2e9ac20f7afaf3f1c2529b5a185bbe21f94
-
SSDEEP
6144:Hza2Nj+MLxwkcWTq/81DDiSTz9nqEja3TXU0xtFu:HqEjk7l7Fu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 576 security.exe 1144 security.exe -
resource yara_rule behavioral1/memory/988-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/988-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/988-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/988-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/988-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/988-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/988-71-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/988-109-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1144-111-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1144-113-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Security = "C:\\Users\\Admin\\AppData\\Roaming\\Security\\security.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1964 set thread context of 988 1964 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 28 PID 576 set thread context of 1144 576 security.exe 33 PID 576 set thread context of 1268 576 security.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe Token: SeDebugPrivilege 1144 security.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1964 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 576 security.exe 1144 security.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1964 wrote to memory of 988 1964 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 28 PID 1964 wrote to memory of 988 1964 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 28 PID 1964 wrote to memory of 988 1964 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 28 PID 1964 wrote to memory of 988 1964 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 28 PID 1964 wrote to memory of 988 1964 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 28 PID 1964 wrote to memory of 988 1964 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 28 PID 1964 wrote to memory of 988 1964 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 28 PID 1964 wrote to memory of 988 1964 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 28 PID 988 wrote to memory of 624 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 29 PID 988 wrote to memory of 624 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 29 PID 988 wrote to memory of 624 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 29 PID 988 wrote to memory of 624 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 29 PID 624 wrote to memory of 1168 624 cmd.exe 31 PID 624 wrote to memory of 1168 624 cmd.exe 31 PID 624 wrote to memory of 1168 624 cmd.exe 31 PID 624 wrote to memory of 1168 624 cmd.exe 31 PID 988 wrote to memory of 576 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 32 PID 988 wrote to memory of 576 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 32 PID 988 wrote to memory of 576 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 32 PID 988 wrote to memory of 576 988 a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe 32 PID 576 wrote to memory of 1144 576 security.exe 33 PID 576 wrote to memory of 1144 576 security.exe 33 PID 576 wrote to memory of 1144 576 security.exe 33 PID 576 wrote to memory of 1144 576 security.exe 33 PID 576 wrote to memory of 1144 576 security.exe 33 PID 576 wrote to memory of 1144 576 security.exe 33 PID 576 wrote to memory of 1144 576 security.exe 33 PID 576 wrote to memory of 1144 576 security.exe 33 PID 576 wrote to memory of 1268 576 security.exe 34 PID 576 wrote to memory of 1268 576 security.exe 34 PID 576 wrote to memory of 1268 576 security.exe 34 PID 576 wrote to memory of 1268 576 security.exe 34 PID 576 wrote to memory of 1268 576 security.exe 34 PID 576 wrote to memory of 1268 576 security.exe 34 PID 576 wrote to memory of 1268 576 security.exe 34 PID 576 wrote to memory of 1268 576 security.exe 34 PID 576 wrote to memory of 1268 576 security.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe"C:\Users\Admin\AppData\Local\Temp\a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe"C:\Users\Admin\AppData\Local\Temp\a51d7468c145280e97fbfa442f6f03caa984539e9b1bf5d53ccb866deab04683.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PCGCA.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Security" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Security\security.exe" /f4⤵
- Adds Run key to start application
PID:1168
-
-
-
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1144
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵PID:1268
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD56f473a1ba53e043362047f72e20b34f4
SHA1e8f121a589e1207ed950453376ee1d21b1223835
SHA2565fbce2c77a90ba9edbcf60be3851ab81633b7c10b1babb624d475c7be589de4b
SHA512b4976d40bc708ae6cddf367a5382cd532e4cf235b848cdaa4e4d317e06d9126e50745a7772591bc21dc7380689f4399e57501b0aa73cd231bce32e22d53b0818
-
Filesize
201KB
MD511c9bfd6e3507de735e581900f6c3f32
SHA1f017c5c83e8c0fc481c62944822c3186f1a1b2df
SHA2566a53d0a9f731db8dc836bfcdf7c9f9e0d4139408f80f0ce647d6811cecda11e1
SHA512a015666f5ada231c1e16816bad01ee10289559a0520dff0c7432fad62478fa5a2cee44e8d49673152f824fd83ab0719ef9162f67357e63e906955910d6eea1ff
-
Filesize
201KB
MD511c9bfd6e3507de735e581900f6c3f32
SHA1f017c5c83e8c0fc481c62944822c3186f1a1b2df
SHA2566a53d0a9f731db8dc836bfcdf7c9f9e0d4139408f80f0ce647d6811cecda11e1
SHA512a015666f5ada231c1e16816bad01ee10289559a0520dff0c7432fad62478fa5a2cee44e8d49673152f824fd83ab0719ef9162f67357e63e906955910d6eea1ff
-
Filesize
201KB
MD511c9bfd6e3507de735e581900f6c3f32
SHA1f017c5c83e8c0fc481c62944822c3186f1a1b2df
SHA2566a53d0a9f731db8dc836bfcdf7c9f9e0d4139408f80f0ce647d6811cecda11e1
SHA512a015666f5ada231c1e16816bad01ee10289559a0520dff0c7432fad62478fa5a2cee44e8d49673152f824fd83ab0719ef9162f67357e63e906955910d6eea1ff
-
Filesize
201KB
MD511c9bfd6e3507de735e581900f6c3f32
SHA1f017c5c83e8c0fc481c62944822c3186f1a1b2df
SHA2566a53d0a9f731db8dc836bfcdf7c9f9e0d4139408f80f0ce647d6811cecda11e1
SHA512a015666f5ada231c1e16816bad01ee10289559a0520dff0c7432fad62478fa5a2cee44e8d49673152f824fd83ab0719ef9162f67357e63e906955910d6eea1ff
-
Filesize
201KB
MD511c9bfd6e3507de735e581900f6c3f32
SHA1f017c5c83e8c0fc481c62944822c3186f1a1b2df
SHA2566a53d0a9f731db8dc836bfcdf7c9f9e0d4139408f80f0ce647d6811cecda11e1
SHA512a015666f5ada231c1e16816bad01ee10289559a0520dff0c7432fad62478fa5a2cee44e8d49673152f824fd83ab0719ef9162f67357e63e906955910d6eea1ff
-
Filesize
201KB
MD511c9bfd6e3507de735e581900f6c3f32
SHA1f017c5c83e8c0fc481c62944822c3186f1a1b2df
SHA2566a53d0a9f731db8dc836bfcdf7c9f9e0d4139408f80f0ce647d6811cecda11e1
SHA512a015666f5ada231c1e16816bad01ee10289559a0520dff0c7432fad62478fa5a2cee44e8d49673152f824fd83ab0719ef9162f67357e63e906955910d6eea1ff
-
Filesize
201KB
MD511c9bfd6e3507de735e581900f6c3f32
SHA1f017c5c83e8c0fc481c62944822c3186f1a1b2df
SHA2566a53d0a9f731db8dc836bfcdf7c9f9e0d4139408f80f0ce647d6811cecda11e1
SHA512a015666f5ada231c1e16816bad01ee10289559a0520dff0c7432fad62478fa5a2cee44e8d49673152f824fd83ab0719ef9162f67357e63e906955910d6eea1ff
-
Filesize
201KB
MD511c9bfd6e3507de735e581900f6c3f32
SHA1f017c5c83e8c0fc481c62944822c3186f1a1b2df
SHA2566a53d0a9f731db8dc836bfcdf7c9f9e0d4139408f80f0ce647d6811cecda11e1
SHA512a015666f5ada231c1e16816bad01ee10289559a0520dff0c7432fad62478fa5a2cee44e8d49673152f824fd83ab0719ef9162f67357e63e906955910d6eea1ff