Analysis
-
max time kernel
129s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe
Resource
win10v2004-20220901-en
General
-
Target
407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe
-
Size
276KB
-
MD5
76b381845bad95fcae5de597f15c9370
-
SHA1
c438818fe78989f242246e04a3dbc68e2a79842b
-
SHA256
407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c
-
SHA512
7ff7619548acd4f8c9df8eaa755fffc4c5d6038667e805ec58a8dec27bef35e26da512266e84875c1b2e8c8f9eb6a73de6a64f98c4b251ce65d618b6d2d00be4
-
SSDEEP
6144:TGij5Nrm/DJznc2m9Q8sR19iNKdUEsgiGs91vc1z/YN2x:zrm/DVhL8sR1DdUpgiN1k1zS+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1732 greendou.exe -
Loads dropped DLL 5 IoCs
pid Process 1764 407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe 1764 407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe 1764 407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe 1764 407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe 1764 407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\greeou\PopWinParam.xml 407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe File created C:\Program Files (x86)\greeou\greendou.exe 407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main greendou.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1732 greendou.exe 1732 greendou.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1732 1764 407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe 26 PID 1764 wrote to memory of 1732 1764 407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe 26 PID 1764 wrote to memory of 1732 1764 407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe 26 PID 1764 wrote to memory of 1732 1764 407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe"C:\Users\Admin\AppData\Local\Temp\407cca7850954a4ab091cd51001e1644f4a76302549476865ef2138bac871b1c.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files (x86)\greeou\greendou.exe"C:\Program Files (x86)\greeou\greendou.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD55878a5fc650998e670c9c75a8c01cbd2
SHA1687166ce5af6881e31ddece8484c467977630f74
SHA256176a5f97ea6a72c2273bcdd22770da93af960df9cc4d665d3eb090105796b545
SHA512a199ab467ed5ae2745432fed9c0ce503885db69c14758e404be2d199971359ed41fbb1feec1bf306764d15ce49a9b86c306c59d222ed4a120b1f5a8d9e2246f3
-
Filesize
297KB
MD5436059abd31132521c370d4b2404656b
SHA137dc56d81013549fc5bba5cdc1ffe331d93a0d89
SHA256a17c3f3d2b5868f403466e50356564d4189a364d171cb3464f667bbdeacccbd5
SHA51200fd376ce9dc3bce63f472b08be76efb182b35f9de951beb97fb9b2d485df5cf7d68745f071fdbbaa0050291c568ea2e201fe29b91c4e03de648fe999b9b73f4
-
Filesize
297KB
MD5436059abd31132521c370d4b2404656b
SHA137dc56d81013549fc5bba5cdc1ffe331d93a0d89
SHA256a17c3f3d2b5868f403466e50356564d4189a364d171cb3464f667bbdeacccbd5
SHA51200fd376ce9dc3bce63f472b08be76efb182b35f9de951beb97fb9b2d485df5cf7d68745f071fdbbaa0050291c568ea2e201fe29b91c4e03de648fe999b9b73f4
-
Filesize
297KB
MD5436059abd31132521c370d4b2404656b
SHA137dc56d81013549fc5bba5cdc1ffe331d93a0d89
SHA256a17c3f3d2b5868f403466e50356564d4189a364d171cb3464f667bbdeacccbd5
SHA51200fd376ce9dc3bce63f472b08be76efb182b35f9de951beb97fb9b2d485df5cf7d68745f071fdbbaa0050291c568ea2e201fe29b91c4e03de648fe999b9b73f4
-
Filesize
297KB
MD5436059abd31132521c370d4b2404656b
SHA137dc56d81013549fc5bba5cdc1ffe331d93a0d89
SHA256a17c3f3d2b5868f403466e50356564d4189a364d171cb3464f667bbdeacccbd5
SHA51200fd376ce9dc3bce63f472b08be76efb182b35f9de951beb97fb9b2d485df5cf7d68745f071fdbbaa0050291c568ea2e201fe29b91c4e03de648fe999b9b73f4
-
Filesize
297KB
MD5436059abd31132521c370d4b2404656b
SHA137dc56d81013549fc5bba5cdc1ffe331d93a0d89
SHA256a17c3f3d2b5868f403466e50356564d4189a364d171cb3464f667bbdeacccbd5
SHA51200fd376ce9dc3bce63f472b08be76efb182b35f9de951beb97fb9b2d485df5cf7d68745f071fdbbaa0050291c568ea2e201fe29b91c4e03de648fe999b9b73f4
-
Filesize
14KB
MD5f0e51d5722c11a4fe40c97b746c1ffc5
SHA18ec31853e9ef08fdc2a8c3c8eaa5f5b9469af193
SHA25693a27f96055ae6b7f44916e13487b0efa7cd6d762e6768f7cb6427e32bda777d
SHA512212c1ed753b54e5eccf7e1421bcca86955e09d6e3873f891d3d7076e21f79feb5f1dba350818804a215980875c306283b02f628fbc191d958f0de0f528c7194a
-
Filesize
14KB
MD5f0e51d5722c11a4fe40c97b746c1ffc5
SHA18ec31853e9ef08fdc2a8c3c8eaa5f5b9469af193
SHA25693a27f96055ae6b7f44916e13487b0efa7cd6d762e6768f7cb6427e32bda777d
SHA512212c1ed753b54e5eccf7e1421bcca86955e09d6e3873f891d3d7076e21f79feb5f1dba350818804a215980875c306283b02f628fbc191d958f0de0f528c7194a