Analysis
-
max time kernel
150s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637.exe
Resource
win10v2004-20220812-en
General
-
Target
a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637.exe
-
Size
843KB
-
MD5
a219e2c42413ac4fe41bcec7545c3570
-
SHA1
ec42609672cacd11202de82fc833c2388e8b49da
-
SHA256
a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637
-
SHA512
54b04179bf9048074530e072a795bfe232f07e322e4b1aa8140cde1cf4b45ddf2d32d0fc94df8db7944f957ba8a4d85451b733a7ff571ecc51b1c8a957b6f640
-
SSDEEP
24576:YLAPic5d4ak4o4p/JA229HMxcfuYjUUUUUUUUUUUUUUUUUUUU:YkanaLoC/JA229HvfuYjUUUUUUUUUUUE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1788 insecure.exe -
Loads dropped DLL 2 IoCs
pid Process 1752 a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637.exe 1752 a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run insecure.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\insecure.exe" insecure.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: insecure.exe File opened (read-only) \??\W: insecure.exe File opened (read-only) \??\Y: insecure.exe File opened (read-only) \??\E: insecure.exe File opened (read-only) \??\F: insecure.exe File opened (read-only) \??\N: insecure.exe File opened (read-only) \??\U: insecure.exe File opened (read-only) \??\H: insecure.exe File opened (read-only) \??\I: insecure.exe File opened (read-only) \??\J: insecure.exe File opened (read-only) \??\P: insecure.exe File opened (read-only) \??\T: insecure.exe File opened (read-only) \??\Z: insecure.exe File opened (read-only) \??\K: insecure.exe File opened (read-only) \??\L: insecure.exe File opened (read-only) \??\R: insecure.exe File opened (read-only) \??\S: insecure.exe File opened (read-only) \??\X: insecure.exe File opened (read-only) \??\G: insecure.exe File opened (read-only) \??\M: insecure.exe File opened (read-only) \??\O: insecure.exe File opened (read-only) \??\Q: insecure.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 insecure.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1752 a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1752 a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe 1788 insecure.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1788 insecure.exe 1788 insecure.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1788 1752 a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637.exe 28 PID 1752 wrote to memory of 1788 1752 a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637.exe 28 PID 1752 wrote to memory of 1788 1752 a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637.exe 28 PID 1752 wrote to memory of 1788 1752 a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637.exe"C:\Users\Admin\AppData\Local\Temp\a175964cfab829cfe7dd87d12ed99d8a5b0e6ef9676fc9e0fec0555fe875b637.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\ProgramData\insecure.exeC:\ProgramData\insecure.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1788
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823KB
MD51b16419e7f68f0e19965eb036acfbe12
SHA16857063bbb5a460a177c013a48acc529311146ae
SHA2568cf725d8d7355368933f6f7d35afcdaf9ce5a6a630531feb4e480b7733dc0f86
SHA5124358259937e010e606373c26a54c3bf66af9d1f46ed155abc39878b21f0ca1ba6f4f62b60fc74870a6a654dfe26540d724abc697710073f6106705181eacc862
-
Filesize
823KB
MD51b16419e7f68f0e19965eb036acfbe12
SHA16857063bbb5a460a177c013a48acc529311146ae
SHA2568cf725d8d7355368933f6f7d35afcdaf9ce5a6a630531feb4e480b7733dc0f86
SHA5124358259937e010e606373c26a54c3bf66af9d1f46ed155abc39878b21f0ca1ba6f4f62b60fc74870a6a654dfe26540d724abc697710073f6106705181eacc862
-
Filesize
823KB
MD51b16419e7f68f0e19965eb036acfbe12
SHA16857063bbb5a460a177c013a48acc529311146ae
SHA2568cf725d8d7355368933f6f7d35afcdaf9ce5a6a630531feb4e480b7733dc0f86
SHA5124358259937e010e606373c26a54c3bf66af9d1f46ed155abc39878b21f0ca1ba6f4f62b60fc74870a6a654dfe26540d724abc697710073f6106705181eacc862