Analysis
-
max time kernel
161s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-10-2022 20:26
Static task
static1
Behavioral task
behavioral1
Sample
b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe
Resource
win10v2004-20220901-en
General
-
Target
b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe
-
Size
354KB
-
MD5
92430135c74c57805b76fac3b1c08902
-
SHA1
7b072e2c3fdffc5cc2b129713ee9590edb83dbe7
-
SHA256
b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388
-
SHA512
fc1fbef9f34b0d311de2a9ed44e1ffce496d5cfe49d78452bec4e90e967520e4827af8485a7f87d68ad45224eff9b9d42147abf3a5a71b036c5f8b7af75607fc
-
SSDEEP
6144:FQq2fqS+L/IKCLbF9tC9yJpinokIUS8CoEJksPJ+caf:l2f+L/eLbvqCtRb3w
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 952 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe -
Deletes itself 1 IoCs
pid Process 904 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 952 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 952 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 952 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Standard Taste = "\\Neuer Ordner\\Setup.exe" b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Standard Taste = "C:\\Users\\Admin\\AppData\\Roaming\\Neuer Ordner\\Setup.exe" b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1928 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe Token: SeDebugPrivilege 952 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 952 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1476 wrote to memory of 952 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 27 PID 1476 wrote to memory of 952 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 27 PID 1476 wrote to memory of 952 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 27 PID 1476 wrote to memory of 952 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 27 PID 1476 wrote to memory of 952 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 27 PID 1476 wrote to memory of 952 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 27 PID 1476 wrote to memory of 952 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 27 PID 1476 wrote to memory of 904 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 28 PID 1476 wrote to memory of 904 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 28 PID 1476 wrote to memory of 904 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 28 PID 1476 wrote to memory of 904 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 28 PID 1476 wrote to memory of 904 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 28 PID 1476 wrote to memory of 904 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 28 PID 1476 wrote to memory of 904 1476 b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe 28 PID 904 wrote to memory of 1928 904 cmd.exe 30 PID 904 wrote to memory of 1928 904 cmd.exe 30 PID 904 wrote to memory of 1928 904 cmd.exe 30 PID 904 wrote to memory of 1928 904 cmd.exe 30 PID 904 wrote to memory of 1928 904 cmd.exe 30 PID 904 wrote to memory of 1928 904 cmd.exe 30 PID 904 wrote to memory of 1928 904 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe"C:\Users\Admin\AppData\Local\Temp\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe"C:\Users\Admin\AppData\Local\Temp\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:1928
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe
Filesize354KB
MD592430135c74c57805b76fac3b1c08902
SHA17b072e2c3fdffc5cc2b129713ee9590edb83dbe7
SHA256b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388
SHA512fc1fbef9f34b0d311de2a9ed44e1ffce496d5cfe49d78452bec4e90e967520e4827af8485a7f87d68ad45224eff9b9d42147abf3a5a71b036c5f8b7af75607fc
-
C:\Users\Admin\AppData\Local\Temp\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe
Filesize354KB
MD592430135c74c57805b76fac3b1c08902
SHA17b072e2c3fdffc5cc2b129713ee9590edb83dbe7
SHA256b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388
SHA512fc1fbef9f34b0d311de2a9ed44e1ffce496d5cfe49d78452bec4e90e967520e4827af8485a7f87d68ad45224eff9b9d42147abf3a5a71b036c5f8b7af75607fc
-
\Users\Admin\AppData\Local\Temp\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe
Filesize354KB
MD592430135c74c57805b76fac3b1c08902
SHA17b072e2c3fdffc5cc2b129713ee9590edb83dbe7
SHA256b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388
SHA512fc1fbef9f34b0d311de2a9ed44e1ffce496d5cfe49d78452bec4e90e967520e4827af8485a7f87d68ad45224eff9b9d42147abf3a5a71b036c5f8b7af75607fc
-
\Users\Admin\AppData\Local\Temp\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe
Filesize354KB
MD592430135c74c57805b76fac3b1c08902
SHA17b072e2c3fdffc5cc2b129713ee9590edb83dbe7
SHA256b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388
SHA512fc1fbef9f34b0d311de2a9ed44e1ffce496d5cfe49d78452bec4e90e967520e4827af8485a7f87d68ad45224eff9b9d42147abf3a5a71b036c5f8b7af75607fc
-
\Users\Admin\AppData\Local\Temp\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe
Filesize354KB
MD592430135c74c57805b76fac3b1c08902
SHA17b072e2c3fdffc5cc2b129713ee9590edb83dbe7
SHA256b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388
SHA512fc1fbef9f34b0d311de2a9ed44e1ffce496d5cfe49d78452bec4e90e967520e4827af8485a7f87d68ad45224eff9b9d42147abf3a5a71b036c5f8b7af75607fc
-
\Users\Admin\AppData\Local\Temp\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388\b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388.exe
Filesize354KB
MD592430135c74c57805b76fac3b1c08902
SHA17b072e2c3fdffc5cc2b129713ee9590edb83dbe7
SHA256b04766016dd1de01741012a88da5ec2adc17b7a0f21f532a84dad01700b13388
SHA512fc1fbef9f34b0d311de2a9ed44e1ffce496d5cfe49d78452bec4e90e967520e4827af8485a7f87d68ad45224eff9b9d42147abf3a5a71b036c5f8b7af75607fc