Analysis
-
max time kernel
139s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 16:56
Static task
static1
Behavioral task
behavioral1
Sample
2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe
Resource
win10v2004-20220812-en
General
-
Target
2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe
-
Size
74KB
-
MD5
90059977d4612ce89ce2d55d3318b10b
-
SHA1
359c49c294aed1a9f1993f76418c63147bf78cc8
-
SHA256
2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd
-
SHA512
e87fdfa94e5ad3de6e0f66c7096aeb220a2a37195542454cab1784e2c9e057f7f549d24b03c5cfdc2fe0e8c3452687958ed2d47edaeb853cc42989304d6ae2b2
-
SSDEEP
1536:HJb7bstbnXgXSJJnxSWdXiF0x6KIiuLPjVtFi2eUNGPrbg0sc:tObnISJtx7yBiUWlsc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 932 simc.tmp -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1820 attrib.exe 1704 attrib.exe -
Deletes itself 1 IoCs
pid Process 1772 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 1904 cmd.exe 1904 cmd.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\FreeRapid\1.bat 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe File created C:\Program Files\FreeRapid\2.bat 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe File opened for modification C:\PROGRA~1\FREERA~1\├└┼«└╓╘░.url cmd.exe File opened for modification C:\PROGRA~1\FREERA~1\╠╘▒ª╣║╬∩.url cmd.exe File opened for modification C:\PROGRA~1\FREERA~1\╟º═┼═┼╣║.url cmd.exe File opened for modification C:\PROGRA~1\FREERA~1\1.inf cmd.exe File created C:\Program Files\FreeRapid\resv.bin 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe File created C:\Program Files\FreeRapid\4.bat 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe File opened for modification C:\PROGRA~1\FREERA~1\┐┤┐┤╡τ╙░.url cmd.exe File opened for modification C:\PROGRA~1\FREERA~1\░╦╪╘╔½═╝.url cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\windows\Comres.dll simc.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\68A12DE4422589E97E1C6396FE17B5024FE0547A simc.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\68A12DE4422589E97E1C6396FE17B5024FE0547A\Blob = 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 simc.tmp -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 932 simc.tmp -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 932 simc.tmp Token: SeRestorePrivilege 932 simc.tmp Token: SeIncBasePriorityPrivilege 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1492 wrote to memory of 932 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 30 PID 1492 wrote to memory of 932 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 30 PID 1492 wrote to memory of 932 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 30 PID 1492 wrote to memory of 932 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 30 PID 932 wrote to memory of 1220 932 simc.tmp 31 PID 932 wrote to memory of 1220 932 simc.tmp 31 PID 932 wrote to memory of 1220 932 simc.tmp 31 PID 932 wrote to memory of 1220 932 simc.tmp 31 PID 1492 wrote to memory of 1904 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 33 PID 1492 wrote to memory of 1904 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 33 PID 1492 wrote to memory of 1904 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 33 PID 1492 wrote to memory of 1904 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 33 PID 1492 wrote to memory of 1772 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 35 PID 1492 wrote to memory of 1772 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 35 PID 1492 wrote to memory of 1772 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 35 PID 1492 wrote to memory of 1772 1492 2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe 35 PID 1904 wrote to memory of 1504 1904 cmd.exe 37 PID 1904 wrote to memory of 1504 1904 cmd.exe 37 PID 1904 wrote to memory of 1504 1904 cmd.exe 37 PID 1904 wrote to memory of 1504 1904 cmd.exe 37 PID 1504 wrote to memory of 872 1504 cmd.exe 39 PID 1504 wrote to memory of 872 1504 cmd.exe 39 PID 1504 wrote to memory of 872 1504 cmd.exe 39 PID 1504 wrote to memory of 872 1504 cmd.exe 39 PID 1504 wrote to memory of 1324 1504 cmd.exe 40 PID 1504 wrote to memory of 1324 1504 cmd.exe 40 PID 1504 wrote to memory of 1324 1504 cmd.exe 40 PID 1504 wrote to memory of 1324 1504 cmd.exe 40 PID 1504 wrote to memory of 1324 1504 cmd.exe 40 PID 1504 wrote to memory of 1324 1504 cmd.exe 40 PID 1504 wrote to memory of 1324 1504 cmd.exe 40 PID 1504 wrote to memory of 1680 1504 cmd.exe 41 PID 1504 wrote to memory of 1680 1504 cmd.exe 41 PID 1504 wrote to memory of 1680 1504 cmd.exe 41 PID 1504 wrote to memory of 1680 1504 cmd.exe 41 PID 1904 wrote to memory of 992 1904 cmd.exe 43 PID 1904 wrote to memory of 992 1904 cmd.exe 43 PID 1904 wrote to memory of 992 1904 cmd.exe 43 PID 1904 wrote to memory of 992 1904 cmd.exe 43 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1704 attrib.exe 1820 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe"C:\Users\Admin\AppData\Local\Temp\2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Roaming\simc.tmpC:\Users\Admin\AppData\Roaming\simc.tmp2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\cmd.execmd /c afc9fe2f418b00a0.bat3⤵PID:1220
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FMAMzwbd12.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\1.bat3⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\PROGRA~1\INTERN~1\iexplore.exeC:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?821334⤵
- Modifies Internet Explorer settings
PID:872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:872 CREDAT:275457 /prefetch:25⤵PID:320
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\1.inf4⤵PID:1324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\2.bat4⤵PID:1680
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?r"" /f5⤵PID:2020
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?r"" /f5⤵PID:1780
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?r"" /f5⤵PID:288
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f5⤵PID:464
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\PROGRA~1\FREERA~1\3.bat""" /f5⤵PID:1924
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\PROGRA~1\FREERA~1\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1820
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\PROGRA~1\FREERA~1\tmp5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1704
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\2.inf5⤵PID:832
-
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r6⤵PID:1080
-
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o7⤵PID:540
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\smap.tmpC:\Users\Admin\AppData\Roaming\smap.tmp3⤵PID:992
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2A1443~1.EXE > nul2⤵
- Deletes itself
PID:1772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52b99b7f66b8ebba3071330bcbaccc022
SHA11a79cdcdd4dd3c9e22b45acdbc20a51da5f23e52
SHA2563ed44f8ec4dd76cadb989353a1ed4a578d93fbba2eb0997443000384e2fb7f09
SHA51203671ec8fbe45df652bddf47141fd017cfd86b25c034608be23eb82035b3e7504765d4fdc9c42e1bbb3de4b132476a5e7156d83fe1982be283c9ea51e9cc8671
-
Filesize
492B
MD534c14b8530e1094e792527f7a474fe77
SHA1f71c4e9091140256b34c18220d1dd1efab1f301d
SHA256fe0dfb3458bfe2a3632d365e00765fa10f14d62e7dfa8b70a055c7eb9fdb6713
SHA51225bb09b526e1e9f5c6052f1f7c36b37c956c1b5649936af8df3abfcf120c931f3d2603e17a061cb99d8c8074bfb1973a5423cce89762fca53cd46aeb3e8944a2
-
Filesize
3KB
MD566255a9ad2f8d7deaa5577ca57942871
SHA18003fcd6cf3edd5b053b2765c7178ae90832f370
SHA256553e76f0372969152c699aa8f02d0610114492cf1a0386cd425a6b6e861aa197
SHA512895951abacd29c28e2970096db9e694626952791f4ff84a77c4f584baae80eb9ef7206fa501d671c6983c9c08cce9016a6a572b65d79fc9f5da39cea9e2d4a04
-
Filesize
230B
MD5f6dcb2862f6e7f9e69fb7d18668c59f1
SHA1bb23dbba95d8af94ecc36a7d2dd4888af2856737
SHA256c68fe97c64b68f00b3cc853ae6a6d324b470a558df57eac2593487978592eb2c
SHA512eefe630b776d2144df39e9c385824374b3d546e30293d7efe10cc2d6bf6f2c932162bf80add1c8ca58afcc868ad02b3ffc104c0f111f3827f4385ee9f26f5e75
-
Filesize
12.3MB
MD5f93dcd1602d374fd6cc76cf71352a12c
SHA1cbf9d53b69ce3dfc8f53f586a378ebfbb78c0251
SHA2562d06664265c55d997432c57b71e1664ae86e3959ad123934fd775cdb9c413186
SHA512b061d7ed4d6d0da5878ceade8b7ebcb4a4749a7c52723813d344089ac6b30ed97850e4df3420f316f599ce93cb35cb1124f32d268b322bf0a711a390245e7494
-
Filesize
150B
MD5a46b691be5eee69ff975ca45c311f018
SHA13b9bed578b7554252eb88f900ce398f25d01910a
SHA256a29ce165a0fbd6c8dfec21c891ac2a4d385ef1f7b29e92ae46b131e6694628f4
SHA5126b8acaa1871b6cb8d68bbabc48146b56f267abb329b9ac2357ac70911fd15bd668ff49260e12d54812fd4f066eed67e311414828ddbc3b9068b8b998edb9c08e
-
Filesize
2KB
MD53d15f5598c7304d4620c459d16b672d6
SHA1d5fd318f2347ef63c062aef5658c5ad5934107c6
SHA25630d8d0e43a0eece7b003fbeb6077a07e910afe03199d3d0022fae0d4be94b7f6
SHA51209c2b357d31851c209d078e3787407555710b2b837ad94f11f9d113259a7f8bdda199c2cea45ab6338d1a8e4ec94f0cb663f13260c4e47383886cb897e9b9a10
-
Filesize
691B
MD597f94bb975876582715e95f7751546bb
SHA1e1b07092d2454c2d95d8aa76bb44feedae59ce3e
SHA2561b6df88776e4b304fe01c9f495e16fb7116a5eacea2579ea07146a6e2324f7c1
SHA5127d1823c36abab4723094255fd98bfac8d9797f2e5d1c56930927e872ccb0f175c9046d63aaccb8ef3ebcd79adccb779c095e95cd277b383bf8c4f4ac4f2782f5
-
Filesize
89KB
MD560a3485b9099f2db25fab138953fb55e
SHA1b7417c7f73957cdc0e2ba17014ad20470d9d9190
SHA256021f89fd1ef5fdea077b67c849f34391638865bf5ac941631d8cdffbe4fbbdc6
SHA512f053a0a3736ed4a5a216b5ae0d6c3e572b51260db09bca5cf793fed0a94498d09082b0e4b79174de05d0220bae7719ce66db811c6bbd368997e905f18b0bac0c
-
Filesize
89KB
MD560a3485b9099f2db25fab138953fb55e
SHA1b7417c7f73957cdc0e2ba17014ad20470d9d9190
SHA256021f89fd1ef5fdea077b67c849f34391638865bf5ac941631d8cdffbe4fbbdc6
SHA512f053a0a3736ed4a5a216b5ae0d6c3e572b51260db09bca5cf793fed0a94498d09082b0e4b79174de05d0220bae7719ce66db811c6bbd368997e905f18b0bac0c
-
Filesize
36.1MB
MD57628f31a6da0842090b8e5c443cf6818
SHA1144abeb64362dc272e6c516a8db4927b5be50e5b
SHA256e7d0b5de15c507014417f6e21ab72228ffe5059528a6793182174830b6bfaa38
SHA512c97e93481d797d206fa346ec4584ae28ef187fd9b8b3274d4bb3084f51f383f85d1dccf5986e3c15430ba78b256df3c63e66ecfe9322533e2e22bbca6d9bebde
-
Filesize
28.0MB
MD5fdf428922322c5e371b44d7ec595e046
SHA1404d5f69f001daf61acce19aef4778add3984ab2
SHA25659a50acf93ad54d786a692467a96c0820c4fea2d4ca5b5ff801e0f3ef1b498ba
SHA512f28375a581517da97967a2418ffa9aeb0be15bb2daf7d52c0c036eb3d7e7ea8a295b6d748486cf86578bc912fe1f884e904fa9bb0c77483d8222e426f985f24d
-
Filesize
89KB
MD560a3485b9099f2db25fab138953fb55e
SHA1b7417c7f73957cdc0e2ba17014ad20470d9d9190
SHA256021f89fd1ef5fdea077b67c849f34391638865bf5ac941631d8cdffbe4fbbdc6
SHA512f053a0a3736ed4a5a216b5ae0d6c3e572b51260db09bca5cf793fed0a94498d09082b0e4b79174de05d0220bae7719ce66db811c6bbd368997e905f18b0bac0c
-
Filesize
89KB
MD560a3485b9099f2db25fab138953fb55e
SHA1b7417c7f73957cdc0e2ba17014ad20470d9d9190
SHA256021f89fd1ef5fdea077b67c849f34391638865bf5ac941631d8cdffbe4fbbdc6
SHA512f053a0a3736ed4a5a216b5ae0d6c3e572b51260db09bca5cf793fed0a94498d09082b0e4b79174de05d0220bae7719ce66db811c6bbd368997e905f18b0bac0c
-
Filesize
35.9MB
MD5b7876ee0f2b13624869dbcc593a6cc91
SHA13097cfafe0795879c7209bfd398de78a270881c9
SHA2565a5d2549a15b7ace90cd21f5087be431696716e48fdd8a0b2d39fbf81239aef0
SHA512cf9cf1ea6f04fb994f31f3ec4f750991fe8ffa111a8c345480668ffaa562ef08a87eac2182196af9b6f0157c7611334b324fb3d5aa09c0de2eb2b8e07ed3a35b
-
Filesize
36.1MB
MD57628f31a6da0842090b8e5c443cf6818
SHA1144abeb64362dc272e6c516a8db4927b5be50e5b
SHA256e7d0b5de15c507014417f6e21ab72228ffe5059528a6793182174830b6bfaa38
SHA512c97e93481d797d206fa346ec4584ae28ef187fd9b8b3274d4bb3084f51f383f85d1dccf5986e3c15430ba78b256df3c63e66ecfe9322533e2e22bbca6d9bebde