Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe
Resource
win10v2004-20220901-en
General
-
Target
f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe
-
Size
150KB
-
MD5
5e00ac27ea934b3c57103ad9830335d0
-
SHA1
312f001fb9d6a0fca61c1f4320354cad47d9fc9f
-
SHA256
f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456
-
SHA512
621b7ed86c96a60185401ba8d551e8b9864e421ec0dbb31103a7553d70fb29e8fe70c764899f0c391874375d2be5903774f959418f63fd4b5532744df8dafc87
-
SSDEEP
3072:Tecu88h/2y1outqzAoU+WuKurV9GqZghAs10jLAH:Tech8oy1oSqvU+WlY8p0jLAH
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 20 4316 rundll32.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WindowsDriver\Parameters\ServiceDll = "C:\\Windows\\system32\\WindowsDriver.dll" f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe -
Loads dropped DLL 2 IoCs
pid Process 2744 svchost.exe 4316 rundll32.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\Uninstall alexa.exe f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe File opened for modification C:\Windows\SysWOW64\IEHost2.txt rundll32.exe File opened for modification C:\Windows\SysWOW64\IETimes.txt rundll32.exe File opened for modification C:\Windows\SysWOW64\IEo.txt rundll32.exe File opened for modification C:\Windows\SysWOW64\IEHost2.txt f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe File opened for modification C:\Windows\SysWOW64\IETimes.txt f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe File opened for modification C:\Windows\SysWOW64\WindowsDriver.dll f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 612 f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe Token: SeDebugPrivilege 2744 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 612 wrote to memory of 2560 612 f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe 84 PID 612 wrote to memory of 2560 612 f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe 84 PID 612 wrote to memory of 2560 612 f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe 84 PID 2744 wrote to memory of 4316 2744 svchost.exe 89 PID 2744 wrote to memory of 4316 2744 svchost.exe 89 PID 2744 wrote to memory of 4316 2744 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe"C:\Users\Admin\AppData\Local\Temp\f9dfa92e953ced6c11fca36cf5f1ddf61cd00103eadc40fe030dd426bb11c456.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\F9DFA9~1.EXE > nul2⤵PID:2560
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k WindowsDriver1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\system32\windowsdriver.dll, ServiceMain2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in System32 directory
PID:4316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75.1MB
MD59895e0d727caf8349fd2c835cec35580
SHA1eae5b04e7b0cdfa539122bffa7a2b41a79a48b46
SHA256f38cb399bc6d58c0781490089f5f24d42c037d196e8411531d6d00cf5a816d90
SHA512cc86fb4b7961e4883410d9c1e9e332831c0cbc77e3fdd74abe5da10948a64c3fc1833dca113e0ec5d1b2ac56c6eba7bae456c1724d08d9cb43bf9723ae471abf
-
Filesize
75.1MB
MD59895e0d727caf8349fd2c835cec35580
SHA1eae5b04e7b0cdfa539122bffa7a2b41a79a48b46
SHA256f38cb399bc6d58c0781490089f5f24d42c037d196e8411531d6d00cf5a816d90
SHA512cc86fb4b7961e4883410d9c1e9e332831c0cbc77e3fdd74abe5da10948a64c3fc1833dca113e0ec5d1b2ac56c6eba7bae456c1724d08d9cb43bf9723ae471abf
-
Filesize
75.1MB
MD59895e0d727caf8349fd2c835cec35580
SHA1eae5b04e7b0cdfa539122bffa7a2b41a79a48b46
SHA256f38cb399bc6d58c0781490089f5f24d42c037d196e8411531d6d00cf5a816d90
SHA512cc86fb4b7961e4883410d9c1e9e332831c0cbc77e3fdd74abe5da10948a64c3fc1833dca113e0ec5d1b2ac56c6eba7bae456c1724d08d9cb43bf9723ae471abf