Analysis
-
max time kernel
149s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe
Resource
win10v2004-20220812-en
General
-
Target
5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe
-
Size
207KB
-
MD5
9018ab3b119bc184db5e6ff7e2c3e710
-
SHA1
5aeb42974058129afdde14bf4c2374b45394d0ff
-
SHA256
5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71
-
SHA512
f700e3b8dc4d97be8e17dce718972dc17f33ad749fb932677591f83de769cedf7024c981d1e773c9354a283b8e2d7be947a26dec956357041856039b5cc16962
-
SSDEEP
3072:FPWzTT9t3EuU/t7YFguAfbXTjTvxGz6bnIKq63cHPIB:FOvT/UD/x73bXTjTvxGz6bnIKovIB
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1968 Services.exe 1984 System Idle Processes.exe -
Deletes itself 1 IoCs
pid Process 1968 Services.exe -
Loads dropped DLL 2 IoCs
pid Process 908 5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe 1968 Services.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1968 Services.exe 1984 System Idle Processes.exe 1968 Services.exe 1968 Services.exe 1984 System Idle Processes.exe 1968 Services.exe 1984 System Idle Processes.exe 1968 Services.exe 1984 System Idle Processes.exe 1968 Services.exe 1984 System Idle Processes.exe 1968 Services.exe 1968 Services.exe 1984 System Idle Processes.exe 1968 Services.exe 1984 System Idle Processes.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1968 Services.exe Token: SeDebugPrivilege 1984 System Idle Processes.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 908 5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe 1968 Services.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1968 Services.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 908 wrote to memory of 1968 908 5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe 27 PID 908 wrote to memory of 1968 908 5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe 27 PID 908 wrote to memory of 1968 908 5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe 27 PID 908 wrote to memory of 1968 908 5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe 27 PID 908 wrote to memory of 1968 908 5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe 27 PID 908 wrote to memory of 1968 908 5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe 27 PID 908 wrote to memory of 1968 908 5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe 27 PID 1968 wrote to memory of 1984 1968 Services.exe 28 PID 1968 wrote to memory of 1984 1968 Services.exe 28 PID 1968 wrote to memory of 1984 1968 Services.exe 28 PID 1968 wrote to memory of 1984 1968 Services.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe"C:\Users\Admin\AppData\Local\Temp\5d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Roaming\Microsoft\Services.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Services.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\Microsoft\System Idle Processes.exe"C:\Users\Admin\AppData\Roaming\Microsoft\System Idle Processes.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD505429069b75363e69356a70c3770dc89
SHA1f5183cfe912990a25519dcf7d79de19acf5657c7
SHA256667c6db11bb025ca540886342d25a04496ab8d2c311a4bb9c5964cb72bd66242
SHA512b9d9d42e2a2a1f29fb652e133ac1ccff4a3e79482d8899a68135dc06f4ab0ee7cd20a7a3eb342e3117a3ce5d83f563fe73b80635c0093021b8ff4f19f45b878e
-
Filesize
207KB
MD59018ab3b119bc184db5e6ff7e2c3e710
SHA15aeb42974058129afdde14bf4c2374b45394d0ff
SHA2565d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71
SHA512f700e3b8dc4d97be8e17dce718972dc17f33ad749fb932677591f83de769cedf7024c981d1e773c9354a283b8e2d7be947a26dec956357041856039b5cc16962
-
Filesize
207KB
MD59018ab3b119bc184db5e6ff7e2c3e710
SHA15aeb42974058129afdde14bf4c2374b45394d0ff
SHA2565d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71
SHA512f700e3b8dc4d97be8e17dce718972dc17f33ad749fb932677591f83de769cedf7024c981d1e773c9354a283b8e2d7be947a26dec956357041856039b5cc16962
-
Filesize
24KB
MD592ce7fb80c508354e5e88fdb6ba6d957
SHA1c816b6cf0ae62385f6a16696eca2307871e9768d
SHA25670e66964ddf9b89b7d95e6a30789a3a9aeaa172c238ebbaf289ce8bb7228d44b
SHA5127a8bccea734b5439e61fcd293fb15573ebd507ce77ae886ff700559074ca76df33ba0c209475055a23f913b767cbcde62c13afd30c9a386ed2c17eec09819b60
-
Filesize
24KB
MD592ce7fb80c508354e5e88fdb6ba6d957
SHA1c816b6cf0ae62385f6a16696eca2307871e9768d
SHA25670e66964ddf9b89b7d95e6a30789a3a9aeaa172c238ebbaf289ce8bb7228d44b
SHA5127a8bccea734b5439e61fcd293fb15573ebd507ce77ae886ff700559074ca76df33ba0c209475055a23f913b767cbcde62c13afd30c9a386ed2c17eec09819b60
-
Filesize
207KB
MD59018ab3b119bc184db5e6ff7e2c3e710
SHA15aeb42974058129afdde14bf4c2374b45394d0ff
SHA2565d62881376fec05d7f05549220420431e960d8ea4f86fafe65089d3f5151ce71
SHA512f700e3b8dc4d97be8e17dce718972dc17f33ad749fb932677591f83de769cedf7024c981d1e773c9354a283b8e2d7be947a26dec956357041856039b5cc16962
-
Filesize
24KB
MD592ce7fb80c508354e5e88fdb6ba6d957
SHA1c816b6cf0ae62385f6a16696eca2307871e9768d
SHA25670e66964ddf9b89b7d95e6a30789a3a9aeaa172c238ebbaf289ce8bb7228d44b
SHA5127a8bccea734b5439e61fcd293fb15573ebd507ce77ae886ff700559074ca76df33ba0c209475055a23f913b767cbcde62c13afd30c9a386ed2c17eec09819b60