Analysis
-
max time kernel
46s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 05:25
Static task
static1
Behavioral task
behavioral1
Sample
51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe
Resource
win10v2004-20220812-en
General
-
Target
51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe
-
Size
1.0MB
-
MD5
579b9d6ff93101819831489592c46142
-
SHA1
8d816ddf346f8c21d0b0dc7715a1efffaf912b12
-
SHA256
51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2
-
SHA512
541b936bed231616ac20d83e41b668268f13fd52b6308decb7997adedb89383865acca2f6ea0bcabc3d48d76fd27a39e94781446c73d5511df8ea8949ee84f4d
-
SSDEEP
24576:/m5jpYmtRqNovh1rM/8DXvQUlNdOgQPt5bMbF2mgmbbuF:kg+vrrMKocnQt5b/4U
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1948 is153068.exe 556 is153068.exe 880 PhotoToColorSketch_setup.exe 996 is-7VI5B.tmp -
Loads dropped DLL 18 IoCs
pid Process 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 1948 is153068.exe 1948 is153068.exe 1948 is153068.exe 1948 is153068.exe 556 is153068.exe 556 is153068.exe 556 is153068.exe 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 880 PhotoToColorSketch_setup.exe 880 PhotoToColorSketch_setup.exe 880 PhotoToColorSketch_setup.exe 772 WerFault.exe 772 WerFault.exe 996 is-7VI5B.tmp 996 is-7VI5B.tmp 772 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 is153068.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum is153068.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1948 set thread context of 556 1948 is153068.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 772 556 WerFault.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1948 is153068.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1948 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 27 PID 1880 wrote to memory of 1948 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 27 PID 1880 wrote to memory of 1948 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 27 PID 1880 wrote to memory of 1948 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 27 PID 1880 wrote to memory of 1948 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 27 PID 1880 wrote to memory of 1948 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 27 PID 1880 wrote to memory of 1948 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 27 PID 1948 wrote to memory of 556 1948 is153068.exe 28 PID 1948 wrote to memory of 556 1948 is153068.exe 28 PID 1948 wrote to memory of 556 1948 is153068.exe 28 PID 1948 wrote to memory of 556 1948 is153068.exe 28 PID 1948 wrote to memory of 556 1948 is153068.exe 28 PID 1948 wrote to memory of 556 1948 is153068.exe 28 PID 1948 wrote to memory of 556 1948 is153068.exe 28 PID 1948 wrote to memory of 556 1948 is153068.exe 28 PID 1948 wrote to memory of 556 1948 is153068.exe 28 PID 1948 wrote to memory of 556 1948 is153068.exe 28 PID 1948 wrote to memory of 556 1948 is153068.exe 28 PID 1948 wrote to memory of 556 1948 is153068.exe 28 PID 1948 wrote to memory of 556 1948 is153068.exe 28 PID 1880 wrote to memory of 880 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 29 PID 1880 wrote to memory of 880 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 29 PID 1880 wrote to memory of 880 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 29 PID 1880 wrote to memory of 880 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 29 PID 1880 wrote to memory of 880 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 29 PID 1880 wrote to memory of 880 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 29 PID 1880 wrote to memory of 880 1880 51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe 29 PID 556 wrote to memory of 772 556 is153068.exe 30 PID 556 wrote to memory of 772 556 is153068.exe 30 PID 556 wrote to memory of 772 556 is153068.exe 30 PID 556 wrote to memory of 772 556 is153068.exe 30 PID 556 wrote to memory of 772 556 is153068.exe 30 PID 556 wrote to memory of 772 556 is153068.exe 30 PID 556 wrote to memory of 772 556 is153068.exe 30 PID 880 wrote to memory of 996 880 PhotoToColorSketch_setup.exe 31 PID 880 wrote to memory of 996 880 PhotoToColorSketch_setup.exe 31 PID 880 wrote to memory of 996 880 PhotoToColorSketch_setup.exe 31 PID 880 wrote to memory of 996 880 PhotoToColorSketch_setup.exe 31 PID 880 wrote to memory of 996 880 PhotoToColorSketch_setup.exe 31 PID 880 wrote to memory of 996 880 PhotoToColorSketch_setup.exe 31 PID 880 wrote to memory of 996 880 PhotoToColorSketch_setup.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe"C:\Users\Admin\AppData\Local\Temp\51d6a9e4b2aa4347c58fa6bb1584cca1d3f73c98020d32ee21ba4c9ca11a6ab2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\is153068.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\is153068.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\is153068.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\is153068.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 2564⤵
- Loads dropped DLL
- Program crash
PID:772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PhotoToColorSketch_setup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PhotoToColorSketch_setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\is-F2M4V.tmp\is-7VI5B.tmp"C:\Users\Admin\AppData\Local\Temp\is-F2M4V.tmp\is-7VI5B.tmp" /SL4 $7011A "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PhotoToColorSketch_setup.exe" 744379 522243⤵
- Executes dropped EXE
- Loads dropped DLL
PID:996
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
956KB
MD5a6ac663d63fef8ccd70a3a2c685ca9ba
SHA1f372deb087628c2d2c33aa779d6c4db9640e886e
SHA2568fb16de8b15b42005ee0ed96bd2be283082ef74ce9d878dc31abe4610074efee
SHA512bbc40a08fdb14686bc1e27bd49340caefa3c0edf4bdf2cd92dd53ea6892c9aa2aacddcc16df97c4d513507095d8e03bc55449298957a42d1bad7b3fa931490ff
-
Filesize
956KB
MD5a6ac663d63fef8ccd70a3a2c685ca9ba
SHA1f372deb087628c2d2c33aa779d6c4db9640e886e
SHA2568fb16de8b15b42005ee0ed96bd2be283082ef74ce9d878dc31abe4610074efee
SHA512bbc40a08fdb14686bc1e27bd49340caefa3c0edf4bdf2cd92dd53ea6892c9aa2aacddcc16df97c4d513507095d8e03bc55449298957a42d1bad7b3fa931490ff
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
656KB
MD54ffc05506afed89fb62438b229f32d3d
SHA1d0dda2ee92a0d0adc91bce9b3efe061bd03af1fa
SHA256c545ae4764531fcf68d561a7946667feac97d65b7b3937afd64e0df06eec62f7
SHA512ba79f4a4abfe276b9e266d5140120ca3207c3d7040125d02f13c999af880b845d7aca0a66e6fb39dbc14955702c42b8fe36f09bfb88a2e3ed30d93bced1afa03
-
Filesize
656KB
MD54ffc05506afed89fb62438b229f32d3d
SHA1d0dda2ee92a0d0adc91bce9b3efe061bd03af1fa
SHA256c545ae4764531fcf68d561a7946667feac97d65b7b3937afd64e0df06eec62f7
SHA512ba79f4a4abfe276b9e266d5140120ca3207c3d7040125d02f13c999af880b845d7aca0a66e6fb39dbc14955702c42b8fe36f09bfb88a2e3ed30d93bced1afa03
-
Filesize
956KB
MD5a6ac663d63fef8ccd70a3a2c685ca9ba
SHA1f372deb087628c2d2c33aa779d6c4db9640e886e
SHA2568fb16de8b15b42005ee0ed96bd2be283082ef74ce9d878dc31abe4610074efee
SHA512bbc40a08fdb14686bc1e27bd49340caefa3c0edf4bdf2cd92dd53ea6892c9aa2aacddcc16df97c4d513507095d8e03bc55449298957a42d1bad7b3fa931490ff
-
Filesize
956KB
MD5a6ac663d63fef8ccd70a3a2c685ca9ba
SHA1f372deb087628c2d2c33aa779d6c4db9640e886e
SHA2568fb16de8b15b42005ee0ed96bd2be283082ef74ce9d878dc31abe4610074efee
SHA512bbc40a08fdb14686bc1e27bd49340caefa3c0edf4bdf2cd92dd53ea6892c9aa2aacddcc16df97c4d513507095d8e03bc55449298957a42d1bad7b3fa931490ff
-
Filesize
956KB
MD5a6ac663d63fef8ccd70a3a2c685ca9ba
SHA1f372deb087628c2d2c33aa779d6c4db9640e886e
SHA2568fb16de8b15b42005ee0ed96bd2be283082ef74ce9d878dc31abe4610074efee
SHA512bbc40a08fdb14686bc1e27bd49340caefa3c0edf4bdf2cd92dd53ea6892c9aa2aacddcc16df97c4d513507095d8e03bc55449298957a42d1bad7b3fa931490ff
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
108KB
MD5726eea22bb372e7f9d2c6340862f1c82
SHA11cdd217a40f8e5d416def7db0ed3903ec4e3b1a3
SHA256eb60a2e41a113c5589919dd99cab1b444dc7f622592e7770a93da51a1cb334d6
SHA51216dcee6b135ad22a1f83e8ad81cc6161376fe17684ec61eb0bc13d3072ff0ef7ff9703b8634884bf46e1344e9dd5914739061f12f3f2791f32856fab396fa582
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
656KB
MD54ffc05506afed89fb62438b229f32d3d
SHA1d0dda2ee92a0d0adc91bce9b3efe061bd03af1fa
SHA256c545ae4764531fcf68d561a7946667feac97d65b7b3937afd64e0df06eec62f7
SHA512ba79f4a4abfe276b9e266d5140120ca3207c3d7040125d02f13c999af880b845d7aca0a66e6fb39dbc14955702c42b8fe36f09bfb88a2e3ed30d93bced1afa03