Analysis
-
max time kernel
148s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 21:55
Static task
static1
Behavioral task
behavioral1
Sample
b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe
Resource
win10v2004-20220901-en
General
-
Target
b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe
-
Size
1.3MB
-
MD5
82dfcb5c33adaaae2975ad51b9258470
-
SHA1
dbc6fe3e95544f837f442635627c2254d7b579ed
-
SHA256
b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800
-
SHA512
d415bd5388ec0129914582256ae9c648168290d4f65bb41e3591670d9b50518109cc1f41f04ad7d5caa9a0d24e4b63f139ebcf1b6b1ee9e03f582043808ab32a
-
SSDEEP
24576:43Sp4fuQAhpQ5LbQxHO9D2iXBo5/sOU1IdvMBC1vpPi9PRWLtY9TxdNEmAN2m:B42QA05b+aHBohsV1QvpK5RQtY9TxsJo
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\wu5Fovm4810Xe9Bi\\YFAig4Ie0KaC.exe\",explorer.exe" b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe -
Executes dropped EXE 2 IoCs
pid Process 1552 J5g7I0m6LYXp5zSG.exe 1424 is-2SAHL.tmp -
Loads dropped DLL 7 IoCs
pid Process 884 b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe 1552 J5g7I0m6LYXp5zSG.exe 1552 J5g7I0m6LYXp5zSG.exe 1552 J5g7I0m6LYXp5zSG.exe 1552 J5g7I0m6LYXp5zSG.exe 1424 is-2SAHL.tmp 1424 is-2SAHL.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 884 b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 884 b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe Token: SeDebugPrivilege 884 b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 884 b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 884 wrote to memory of 1552 884 b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe 27 PID 884 wrote to memory of 1552 884 b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe 27 PID 884 wrote to memory of 1552 884 b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe 27 PID 884 wrote to memory of 1552 884 b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe 27 PID 884 wrote to memory of 1552 884 b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe 27 PID 884 wrote to memory of 1552 884 b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe 27 PID 884 wrote to memory of 1552 884 b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe 27 PID 1552 wrote to memory of 1424 1552 J5g7I0m6LYXp5zSG.exe 28 PID 1552 wrote to memory of 1424 1552 J5g7I0m6LYXp5zSG.exe 28 PID 1552 wrote to memory of 1424 1552 J5g7I0m6LYXp5zSG.exe 28 PID 1552 wrote to memory of 1424 1552 J5g7I0m6LYXp5zSG.exe 28 PID 1552 wrote to memory of 1424 1552 J5g7I0m6LYXp5zSG.exe 28 PID 1552 wrote to memory of 1424 1552 J5g7I0m6LYXp5zSG.exe 28 PID 1552 wrote to memory of 1424 1552 J5g7I0m6LYXp5zSG.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe"C:\Users\Admin\AppData\Local\Temp\b25d1e8ab20ad15c5304b804c8a5ff9dbada8c77b36ea6cd85e1c20c407ac800.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\J5g7I0m6LYXp5zSG.exe"C:\Users\Admin\AppData\Local\Temp\J5g7I0m6LYXp5zSG.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\is-IEUKT.tmp\is-2SAHL.tmp"C:\Users\Admin\AppData\Local\Temp\is-IEUKT.tmp\is-2SAHL.tmp" /SL4 $10162 C:\Users\Admin\AppData\Local\Temp\J5g7I0m6LYXp5zSG.exe 435071 506883⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1424
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
634KB
MD569ffc65b14c4428dd95922629a125d09
SHA1f9d287bf5d9fb78a348f214888a6408cd144bc16
SHA256f7d9a130b911d52cfd4d00e9c61d0360064d82cfe440bdca16af0ee0c56b16db
SHA512a2476b48933e7e150519172c3e8eeabb1f9129f9e1dd5d7ff50d5423bd02d0800638382e5994997864cf726ea6ebe571966771e082e34f873029582770deb7ec
-
Filesize
634KB
MD569ffc65b14c4428dd95922629a125d09
SHA1f9d287bf5d9fb78a348f214888a6408cd144bc16
SHA256f7d9a130b911d52cfd4d00e9c61d0360064d82cfe440bdca16af0ee0c56b16db
SHA512a2476b48933e7e150519172c3e8eeabb1f9129f9e1dd5d7ff50d5423bd02d0800638382e5994997864cf726ea6ebe571966771e082e34f873029582770deb7ec
-
Filesize
572KB
MD50d0622f7d2fd629455a028d7e1cb1c07
SHA182bdfc15f188241c535d7a42f0f95c99d0913bf4
SHA256ab0982c120a65adc3aa898af09ad923c9b896edfc52f7d206798c5fdf59d8f5a
SHA512eb5a930c1ba85b9cdb60a65fcead39592f7a1b87985d927580bbdb9f8682087291a4eac9f5b2f7c8d4aa7abff78ce8c53dd7285bd7be8572cb65ade906e8807a
-
Filesize
572KB
MD50d0622f7d2fd629455a028d7e1cb1c07
SHA182bdfc15f188241c535d7a42f0f95c99d0913bf4
SHA256ab0982c120a65adc3aa898af09ad923c9b896edfc52f7d206798c5fdf59d8f5a
SHA512eb5a930c1ba85b9cdb60a65fcead39592f7a1b87985d927580bbdb9f8682087291a4eac9f5b2f7c8d4aa7abff78ce8c53dd7285bd7be8572cb65ade906e8807a
-
Filesize
634KB
MD569ffc65b14c4428dd95922629a125d09
SHA1f9d287bf5d9fb78a348f214888a6408cd144bc16
SHA256f7d9a130b911d52cfd4d00e9c61d0360064d82cfe440bdca16af0ee0c56b16db
SHA512a2476b48933e7e150519172c3e8eeabb1f9129f9e1dd5d7ff50d5423bd02d0800638382e5994997864cf726ea6ebe571966771e082e34f873029582770deb7ec
-
Filesize
634KB
MD569ffc65b14c4428dd95922629a125d09
SHA1f9d287bf5d9fb78a348f214888a6408cd144bc16
SHA256f7d9a130b911d52cfd4d00e9c61d0360064d82cfe440bdca16af0ee0c56b16db
SHA512a2476b48933e7e150519172c3e8eeabb1f9129f9e1dd5d7ff50d5423bd02d0800638382e5994997864cf726ea6ebe571966771e082e34f873029582770deb7ec
-
Filesize
634KB
MD569ffc65b14c4428dd95922629a125d09
SHA1f9d287bf5d9fb78a348f214888a6408cd144bc16
SHA256f7d9a130b911d52cfd4d00e9c61d0360064d82cfe440bdca16af0ee0c56b16db
SHA512a2476b48933e7e150519172c3e8eeabb1f9129f9e1dd5d7ff50d5423bd02d0800638382e5994997864cf726ea6ebe571966771e082e34f873029582770deb7ec
-
Filesize
634KB
MD569ffc65b14c4428dd95922629a125d09
SHA1f9d287bf5d9fb78a348f214888a6408cd144bc16
SHA256f7d9a130b911d52cfd4d00e9c61d0360064d82cfe440bdca16af0ee0c56b16db
SHA512a2476b48933e7e150519172c3e8eeabb1f9129f9e1dd5d7ff50d5423bd02d0800638382e5994997864cf726ea6ebe571966771e082e34f873029582770deb7ec
-
Filesize
572KB
MD50d0622f7d2fd629455a028d7e1cb1c07
SHA182bdfc15f188241c535d7a42f0f95c99d0913bf4
SHA256ab0982c120a65adc3aa898af09ad923c9b896edfc52f7d206798c5fdf59d8f5a
SHA512eb5a930c1ba85b9cdb60a65fcead39592f7a1b87985d927580bbdb9f8682087291a4eac9f5b2f7c8d4aa7abff78ce8c53dd7285bd7be8572cb65ade906e8807a
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3