Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe
Resource
win10v2004-20220812-en
General
-
Target
d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe
-
Size
1.3MB
-
MD5
8286cbe2ae68e0fe1def5f49987e2fa4
-
SHA1
43174fe32da0aa67594595fc273ca2fdb24a5d8e
-
SHA256
d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420
-
SHA512
51d80ae1c56b6581bafee0f1acb1807b2dc5aca983e0bab8d78a276266efc46ae2731717ce17e69af774e540b6afc1223810b6f8039208faf81e2d14bc7692be
-
SSDEEP
24576:Wi14HEntb6qqW0BtSasydx+/gWD2BND6t3LYXIH1qMQo8:W1HSwKX2zWYYH8o8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1776 search.cmd -
Deletes itself 1 IoCs
pid Process 1716 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\search.cmd d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\search.cmd d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe -
Loads dropped DLL 2 IoCs
pid Process 1504 d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe 1504 d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1776 search.cmd -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1776 1504 d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe 29 PID 1504 wrote to memory of 1776 1504 d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe 29 PID 1504 wrote to memory of 1776 1504 d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe 29 PID 1504 wrote to memory of 1776 1504 d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe 29 PID 1504 wrote to memory of 1716 1504 d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe 30 PID 1504 wrote to memory of 1716 1504 d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe 30 PID 1504 wrote to memory of 1716 1504 d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe 30 PID 1504 wrote to memory of 1716 1504 d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe"C:\Users\Admin\AppData\Local\Temp\d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\search.cmd"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\search.cmd"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del c:\users\admin\appdata\local\temp\D67BED~1.EXE >> NUL2⤵
- Deletes itself
PID:1716
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58286cbe2ae68e0fe1def5f49987e2fa4
SHA143174fe32da0aa67594595fc273ca2fdb24a5d8e
SHA256d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420
SHA51251d80ae1c56b6581bafee0f1acb1807b2dc5aca983e0bab8d78a276266efc46ae2731717ce17e69af774e540b6afc1223810b6f8039208faf81e2d14bc7692be
-
Filesize
1.3MB
MD58286cbe2ae68e0fe1def5f49987e2fa4
SHA143174fe32da0aa67594595fc273ca2fdb24a5d8e
SHA256d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420
SHA51251d80ae1c56b6581bafee0f1acb1807b2dc5aca983e0bab8d78a276266efc46ae2731717ce17e69af774e540b6afc1223810b6f8039208faf81e2d14bc7692be
-
Filesize
1.3MB
MD58286cbe2ae68e0fe1def5f49987e2fa4
SHA143174fe32da0aa67594595fc273ca2fdb24a5d8e
SHA256d67bedd4d6e447a8070fe00d418e874b5e942041debc4c31dcd1c8194b810420
SHA51251d80ae1c56b6581bafee0f1acb1807b2dc5aca983e0bab8d78a276266efc46ae2731717ce17e69af774e540b6afc1223810b6f8039208faf81e2d14bc7692be