Analysis
-
max time kernel
47s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 16:44
Behavioral task
behavioral1
Sample
7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a.exe
-
Size
50KB
-
MD5
61336286e20aff0d064a15ec60552616
-
SHA1
595bc8b07ec03a97152c9718db9465be07863d12
-
SHA256
7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a
-
SHA512
c3e4d77664a0006c56fde37be75a34f1d24ba0102da219b85e3cde9afe7c5f0c2cb1bbbc5dc2adcb5f7cbc64ac849a0e79b5c73f355b6758715ee716ec3fde4b
-
SSDEEP
768:FUSoxFgc9v8O3a9SqoYWGcCijauyBvfNoEHtFGaqI9NGYJXKoJG4PH:hSF9v81jwUl5XRNFGHWf
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1676-58-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\2067414005 = "C:\\Users\\Admin\\2067414005\\2067414005.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 1760 reg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2012 shutdown.exe Token: SeRemoteShutdownPrivilege 2012 shutdown.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2012 1676 7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a.exe 28 PID 1676 wrote to memory of 2012 1676 7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a.exe 28 PID 1676 wrote to memory of 2012 1676 7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a.exe 28 PID 1676 wrote to memory of 2012 1676 7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a.exe 28 PID 1676 wrote to memory of 1384 1676 7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a.exe 30 PID 1676 wrote to memory of 1384 1676 7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a.exe 30 PID 1676 wrote to memory of 1384 1676 7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a.exe 30 PID 1676 wrote to memory of 1384 1676 7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a.exe 30 PID 1384 wrote to memory of 1760 1384 cmd.exe 33 PID 1384 wrote to memory of 1760 1384 cmd.exe 33 PID 1384 wrote to memory of 1760 1384 cmd.exe 33 PID 1384 wrote to memory of 1760 1384 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a.exe"C:\Users\Admin\AppData\Local\Temp\7e682a244f243fcf50c12a2226b37a9c61e89c7a429256e6c95476c8ad56410a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /t 6 /f2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 2067414005 /d "C:\Users\Admin\2067414005\2067414005.exe" /F2⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 2067414005 /d "C:\Users\Admin\2067414005\2067414005.exe" /F3⤵
- Adds Run key to start application
- Modifies registry key
PID:1760
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1768
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:572