Analysis
-
max time kernel
417s -
max time network
422s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-10-2022 23:52
Static task
static1
Behavioral task
behavioral1
Sample
2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe
Resource
win7-20220901-en
General
-
Target
2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe
-
Size
302KB
-
MD5
fddf052c867459e52b86307ffdd2f0b8
-
SHA1
471c4e337c3f37d19ed21b1b3ca47caf7f5287fb
-
SHA256
2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7
-
SHA512
903d2debcccf78191cec690995e6fa635445d8bb7216b7b88b73755dd74ad295706e81ca3803da7be52cf917bf291cea9915459025b89b32343e63fbd9408f07
-
SSDEEP
6144:mMMYNXqBBtzd0e6OGxUf4lnWFJuDlw2bt6MY8E/0RMKYrsTL16Qj8iA:qntz28wlPlww6Mfk0R9R4Qj8P
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exepid Process 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exedescription pid Process procid_target PID 2028 set thread context of 1620 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exedescription pid Process procid_target PID 2028 wrote to memory of 1620 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe 27 PID 2028 wrote to memory of 1620 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe 27 PID 2028 wrote to memory of 1620 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe 27 PID 2028 wrote to memory of 1620 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe 27 PID 2028 wrote to memory of 1620 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe 27 PID 2028 wrote to memory of 1620 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe 27 PID 2028 wrote to memory of 1620 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe 27 PID 2028 wrote to memory of 1620 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe 27 PID 2028 wrote to memory of 1620 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe 27 PID 2028 wrote to memory of 1620 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe 27 PID 2028 wrote to memory of 1620 2028 2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe"C:\Users\Admin\AppData\Local\Temp\2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe"C:\Users\Admin\AppData\Local\Temp\2013911086eeba13ee90a57d81a27fabdab52e9896f0ec55e7b9aec0528c57b7.exe"2⤵PID:1620
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5aa7a954d0ea7dbb90068bdd32d997f2a
SHA18a6ec0b72e5000900a71b5eb4bd81dda342a0dd9
SHA256fda8e2088f7ca3f22d90e0ce3a9e2e466b7a30e96cfc166059156aabab3dea1b
SHA5122850c7a06a3b03cd4989ee0db61b0b91746489b5ddbdddfc351d30c52147b0cbe6cbecd6c8737fe3ffa11f5db97948472adeb4031f72829205052ae7d24e5d80
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390