Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe
Resource
win10v2004-20220901-en
General
-
Target
f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe
-
Size
574KB
-
MD5
4c4715773f8bc6215d0335248d3a36d0
-
SHA1
05d04b71865262a054a848488167f6a510dde170
-
SHA256
f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b
-
SHA512
252acfc180e770a05f305393f1fb0e24f2d1526f100c004368f4b01ade854d6aae7d4271a4d7a6cb3df44932de46ef79c90399a722d0a537b4da2b1f2eeb8f63
-
SSDEEP
12288:3vpkka7BjivXBe0NEieYOdp1aeHW6pZHCLtkZ5Es24vem8QMSRp:3vSka7oHLeYO3vRZHkt6243x
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1308-55-0x0000000001DA0000-0x0000000001ED0000-memory.dmp upx behavioral1/memory/1308-59-0x0000000001DA0000-0x0000000001ED0000-memory.dmp upx behavioral1/memory/1308-58-0x0000000001DA0000-0x0000000001ED0000-memory.dmp upx behavioral1/memory/1308-62-0x0000000001DA0000-0x0000000001ED0000-memory.dmp upx behavioral1/memory/1308-63-0x0000000001DA0000-0x0000000001ED0000-memory.dmp upx behavioral1/memory/764-66-0x0000000001D40000-0x0000000001E70000-memory.dmp upx behavioral1/memory/764-70-0x0000000001D40000-0x0000000001E70000-memory.dmp upx behavioral1/memory/764-69-0x0000000001D40000-0x0000000001E70000-memory.dmp upx behavioral1/memory/764-71-0x0000000001D40000-0x0000000001E70000-memory.dmp upx behavioral1/memory/1308-73-0x0000000001DA0000-0x0000000001ED0000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is7087063.log f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1308 f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe 1308 f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1308 f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1308 f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe 1308 f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1308 wrote to memory of 764 1308 f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe 27 PID 1308 wrote to memory of 764 1308 f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe 27 PID 1308 wrote to memory of 764 1308 f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe 27 PID 1308 wrote to memory of 764 1308 f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe"C:\Users\Admin\AppData\Local\Temp\f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe"1⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe"C:\Users\Admin\AppData\Local\Temp\f6da2cd4321a9b0471d76ca3f947b7112a09b974ed333cf09b91687e043ef09b.exe" /_ShowProgress2⤵PID:764
-