Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464.exe
Resource
win10v2004-20220812-en
General
-
Target
124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464.exe
-
Size
46KB
-
MD5
21228fbe66626fe4c5a33434f9d85e90
-
SHA1
86fa42794744cd35edbf4b62c19c392b17fcf01e
-
SHA256
124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464
-
SHA512
27ee70f01e40a617abab02a7a712f57a1dcebcc3e061e9f2d00cfe60ff7bc2d3eaa160326b5fe7afb638b11163eb9faf17e9d4728de583c333556660a6dda07f
-
SSDEEP
768:7eA7WjwT3l+DgujLApO6U7wfjux2O/i1evkayQ9KwmwtMi:6AQ6U+juUOq1YkBIW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2012 svchostt.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 628 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f663d17bbd60f89f628e070877cc08e8.exe svchostt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f663d17bbd60f89f628e070877cc08e8.exe svchostt.exe -
Loads dropped DLL 1 IoCs
pid Process 1948 124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2012 svchostt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2012 svchostt.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2012 1948 124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464.exe 28 PID 1948 wrote to memory of 2012 1948 124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464.exe 28 PID 1948 wrote to memory of 2012 1948 124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464.exe 28 PID 1948 wrote to memory of 2012 1948 124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464.exe 28 PID 2012 wrote to memory of 628 2012 svchostt.exe 29 PID 2012 wrote to memory of 628 2012 svchostt.exe 29 PID 2012 wrote to memory of 628 2012 svchostt.exe 29 PID 2012 wrote to memory of 628 2012 svchostt.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464.exe"C:\Users\Admin\AppData\Local\Temp\124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\svchostt.exe"C:\Users\Admin\AppData\Local\Temp\svchostt.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\svchostt.exe" "svchostt.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD521228fbe66626fe4c5a33434f9d85e90
SHA186fa42794744cd35edbf4b62c19c392b17fcf01e
SHA256124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464
SHA51227ee70f01e40a617abab02a7a712f57a1dcebcc3e061e9f2d00cfe60ff7bc2d3eaa160326b5fe7afb638b11163eb9faf17e9d4728de583c333556660a6dda07f
-
Filesize
46KB
MD521228fbe66626fe4c5a33434f9d85e90
SHA186fa42794744cd35edbf4b62c19c392b17fcf01e
SHA256124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464
SHA51227ee70f01e40a617abab02a7a712f57a1dcebcc3e061e9f2d00cfe60ff7bc2d3eaa160326b5fe7afb638b11163eb9faf17e9d4728de583c333556660a6dda07f
-
Filesize
46KB
MD521228fbe66626fe4c5a33434f9d85e90
SHA186fa42794744cd35edbf4b62c19c392b17fcf01e
SHA256124c59b3ac73aa4b5e0238d71f32b5fe99865f092567e8a8de92d85fcca3c464
SHA51227ee70f01e40a617abab02a7a712f57a1dcebcc3e061e9f2d00cfe60ff7bc2d3eaa160326b5fe7afb638b11163eb9faf17e9d4728de583c333556660a6dda07f