Analysis
-
max time kernel
151s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd.exe
Resource
win10v2004-20220812-en
General
-
Target
9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd.exe
-
Size
842KB
-
MD5
7bd0168fe3456a9d72270d1818d26252
-
SHA1
06df0bc1cf3c77dd3736c2d88925e87b016bd80f
-
SHA256
9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd
-
SHA512
7278a8bc3c39d7eb0a2e4b818967a51e9b5b7761b9520278f1b0ce548bde7f04b13b6904a527cf4dad1ef07fb6f6921088d6a4a3300fbf63418878b230e20970
-
SSDEEP
12288:GsOvjPKfPdNwzzuN3zXJgAtC9ysYHY6dHdQWZBUvK+Sl6TDu/tDI+viMVkDNAcKI:G9vjM3NLJNoWxHd/cK+SgaJNaM05D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1012 midefender.exe -
Loads dropped DLL 2 IoCs
pid Process 956 9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd.exe 956 9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run midefender.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\midefender.exe" midefender.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: midefender.exe File opened (read-only) \??\Y: midefender.exe File opened (read-only) \??\F: midefender.exe File opened (read-only) \??\K: midefender.exe File opened (read-only) \??\S: midefender.exe File opened (read-only) \??\T: midefender.exe File opened (read-only) \??\U: midefender.exe File opened (read-only) \??\H: midefender.exe File opened (read-only) \??\I: midefender.exe File opened (read-only) \??\J: midefender.exe File opened (read-only) \??\Q: midefender.exe File opened (read-only) \??\X: midefender.exe File opened (read-only) \??\E: midefender.exe File opened (read-only) \??\G: midefender.exe File opened (read-only) \??\L: midefender.exe File opened (read-only) \??\M: midefender.exe File opened (read-only) \??\N: midefender.exe File opened (read-only) \??\P: midefender.exe File opened (read-only) \??\R: midefender.exe File opened (read-only) \??\V: midefender.exe File opened (read-only) \??\W: midefender.exe File opened (read-only) \??\Z: midefender.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 midefender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 956 9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 956 9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe 1012 midefender.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1012 midefender.exe 1012 midefender.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 956 wrote to memory of 1012 956 9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd.exe 27 PID 956 wrote to memory of 1012 956 9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd.exe 27 PID 956 wrote to memory of 1012 956 9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd.exe 27 PID 956 wrote to memory of 1012 956 9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd.exe"C:\Users\Admin\AppData\Local\Temp\9bb6444888650ee94fc048c9dc6cd3b3cc01b2a0331407c3cd068a19618acebd.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:956 -
C:\ProgramData\midefender.exeC:\ProgramData\midefender.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
820KB
MD59c0658d88c420b52fa1652c9fb6b4a9a
SHA152c71b9f0b5f0596ad8045f62d75cfda5d1bcb34
SHA256bfbc03f8559685eb53ad4d25a0de70f66b4c7f5db790cae996277409dfbfdf06
SHA512957eb63a2cd6799878522f8cad050c836369bf71c4481a5b2079db0689bff898fb9d6622d0d48f10295b6ceb2c9383f53903374a97c8f4f2e311da7989e3506a
-
Filesize
820KB
MD59c0658d88c420b52fa1652c9fb6b4a9a
SHA152c71b9f0b5f0596ad8045f62d75cfda5d1bcb34
SHA256bfbc03f8559685eb53ad4d25a0de70f66b4c7f5db790cae996277409dfbfdf06
SHA512957eb63a2cd6799878522f8cad050c836369bf71c4481a5b2079db0689bff898fb9d6622d0d48f10295b6ceb2c9383f53903374a97c8f4f2e311da7989e3506a
-
Filesize
820KB
MD59c0658d88c420b52fa1652c9fb6b4a9a
SHA152c71b9f0b5f0596ad8045f62d75cfda5d1bcb34
SHA256bfbc03f8559685eb53ad4d25a0de70f66b4c7f5db790cae996277409dfbfdf06
SHA512957eb63a2cd6799878522f8cad050c836369bf71c4481a5b2079db0689bff898fb9d6622d0d48f10295b6ceb2c9383f53903374a97c8f4f2e311da7989e3506a