Analysis
-
max time kernel
43s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 19:35
Static task
static1
Behavioral task
behavioral1
Sample
c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe
Resource
win10v2004-20220812-en
General
-
Target
c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe
-
Size
692KB
-
MD5
80e0e41c5bdaac069e2b30378ec366b6
-
SHA1
200732386956fe16ef0e5c583f8f19272bd08e37
-
SHA256
c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485
-
SHA512
dc4188c68826388f5cea9eb5ee3b36c00f8e4e1462f73de23783fbf65b8a81a86961d78d8442da856f505a92ee1d377d298f06180bda78c7d1794c874861b58c
-
SSDEEP
12288:yw+e128lASKpmP84IyiiZV26ioxM9fJvyZJFzLck0iszvO94ACYm:oeU8l6j9y46HxMBt+JFsUszvo4ACYm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 828 WindowsSecurityUpdate.exe -
resource yara_rule behavioral1/memory/1676-61-0x0000000000400000-0x0000000000515000-memory.dmp upx behavioral1/memory/828-64-0x0000000000400000-0x0000000000515000-memory.dmp upx behavioral1/memory/828-65-0x0000000000400000-0x0000000000515000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1676 c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe 1676 c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe 1676 c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe 1676 c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1676 c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1676 wrote to memory of 828 1676 c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe 28 PID 1676 wrote to memory of 828 1676 c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe 28 PID 1676 wrote to memory of 828 1676 c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe 28 PID 1676 wrote to memory of 828 1676 c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe 28 PID 1676 wrote to memory of 828 1676 c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe 28 PID 1676 wrote to memory of 828 1676 c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe 28 PID 1676 wrote to memory of 828 1676 c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe"C:\Users\Admin\AppData\Local\Temp\c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Roaming\HfDRRR9D\WindowsSecurityUpdate.exe"C:\Users\Admin\AppData\Roaming\HfDRRR9D\WindowsSecurityUpdate.exe" -services2⤵
- Executes dropped EXE
PID:828
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
692KB
MD580e0e41c5bdaac069e2b30378ec366b6
SHA1200732386956fe16ef0e5c583f8f19272bd08e37
SHA256c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485
SHA512dc4188c68826388f5cea9eb5ee3b36c00f8e4e1462f73de23783fbf65b8a81a86961d78d8442da856f505a92ee1d377d298f06180bda78c7d1794c874861b58c
-
Filesize
692KB
MD580e0e41c5bdaac069e2b30378ec366b6
SHA1200732386956fe16ef0e5c583f8f19272bd08e37
SHA256c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485
SHA512dc4188c68826388f5cea9eb5ee3b36c00f8e4e1462f73de23783fbf65b8a81a86961d78d8442da856f505a92ee1d377d298f06180bda78c7d1794c874861b58c
-
Filesize
692KB
MD580e0e41c5bdaac069e2b30378ec366b6
SHA1200732386956fe16ef0e5c583f8f19272bd08e37
SHA256c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485
SHA512dc4188c68826388f5cea9eb5ee3b36c00f8e4e1462f73de23783fbf65b8a81a86961d78d8442da856f505a92ee1d377d298f06180bda78c7d1794c874861b58c
-
Filesize
692KB
MD580e0e41c5bdaac069e2b30378ec366b6
SHA1200732386956fe16ef0e5c583f8f19272bd08e37
SHA256c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485
SHA512dc4188c68826388f5cea9eb5ee3b36c00f8e4e1462f73de23783fbf65b8a81a86961d78d8442da856f505a92ee1d377d298f06180bda78c7d1794c874861b58c
-
Filesize
692KB
MD580e0e41c5bdaac069e2b30378ec366b6
SHA1200732386956fe16ef0e5c583f8f19272bd08e37
SHA256c37a889731f1d13c1c107ecc494c7f3deb831c98a7afa4ac2e3731c0c4994485
SHA512dc4188c68826388f5cea9eb5ee3b36c00f8e4e1462f73de23783fbf65b8a81a86961d78d8442da856f505a92ee1d377d298f06180bda78c7d1794c874861b58c