Analysis

  • max time kernel
    598s
  • max time network
    432s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-10-2022 05:11

General

  • Target

    1f7d74e5ccf5681021323717359fb3efc6213d45ee84628c56f476f856477df4.exe

  • Size

    228KB

  • MD5

    f37f9160e2cf021983080ee0046529be

  • SHA1

    65095a67c453db178b5735e7ecbeccbf1338ed75

  • SHA256

    1f7d74e5ccf5681021323717359fb3efc6213d45ee84628c56f476f856477df4

  • SHA512

    e02014e203c776bf8f11ebd48dc9abf132a8a907fa87e21b0f37306b0924f56dce99af7ed5fbcd862b3c6173c7cf09335c2fc1d4edc6f5753bd16bfdbab2d5de

  • SSDEEP

    3072:at02MzGJiEWNgZEYCATuvcurAVI0XN0bHJJ2yMUp7JaHVKFqa:bNNguNATkAVI0iLFMiIKFqa

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\1f7d74e5ccf5681021323717359fb3efc6213d45ee84628c56f476f856477df4.exe
        "C:\Users\Admin\AppData\Local\Temp\1f7d74e5ccf5681021323717359fb3efc6213d45ee84628c56f476f856477df4.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1264
        • C:\Users\Admin\AppData\Roaming\Microsoft\Etkueect\etkueec.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Etkueect\etkueec.exe
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1660
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            4⤵
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1496
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\\System32\\autoconv.exe" > "C:\Users\Admin\AppData\Local\Temp\1f7d74e5ccf5681021323717359fb3efc6213d45ee84628c56f476f856477df4.exe" & del /F /Q "C:\Users\Admin\AppData\Local\Temp\1f7d74e5ccf5681021323717359f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1568
          • C:\Windows\SysWOW64\PING.EXE
            ping.exe -n 6 127.0.0.1
            4⤵
            • Runs ping.exe
            PID:584
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1164
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1068

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Etkueect\etkuee.dll

          Filesize

          79B

          MD5

          a7192fc05c60e1387a85eeb15d50799c

          SHA1

          f4cf194903e1675ef25cfe43b975347049e8e590

          SHA256

          a3aae5fdb8f95b2bdac2b7d11df6118b281b055b7eec67faca0efc5ed6fe2224

          SHA512

          fc7cda02030845aada3c48d1206f0f0903154e21b72817172a5e7c9344a183e4feba9cd4b03aec7bb99d156d72b1e10256c696310c41bbfa1d3f74fc9c37e060

        • C:\Users\Admin\AppData\Roaming\Microsoft\Etkueect\etkueec.exe

          Filesize

          228KB

          MD5

          f37f9160e2cf021983080ee0046529be

          SHA1

          65095a67c453db178b5735e7ecbeccbf1338ed75

          SHA256

          1f7d74e5ccf5681021323717359fb3efc6213d45ee84628c56f476f856477df4

          SHA512

          e02014e203c776bf8f11ebd48dc9abf132a8a907fa87e21b0f37306b0924f56dce99af7ed5fbcd862b3c6173c7cf09335c2fc1d4edc6f5753bd16bfdbab2d5de

        • \Users\Admin\AppData\Roaming\Microsoft\Etkueect\etkueec.exe

          Filesize

          228KB

          MD5

          f37f9160e2cf021983080ee0046529be

          SHA1

          65095a67c453db178b5735e7ecbeccbf1338ed75

          SHA256

          1f7d74e5ccf5681021323717359fb3efc6213d45ee84628c56f476f856477df4

          SHA512

          e02014e203c776bf8f11ebd48dc9abf132a8a907fa87e21b0f37306b0924f56dce99af7ed5fbcd862b3c6173c7cf09335c2fc1d4edc6f5753bd16bfdbab2d5de

        • \Users\Admin\AppData\Roaming\Microsoft\Etkueect\etkueec.exe

          Filesize

          228KB

          MD5

          f37f9160e2cf021983080ee0046529be

          SHA1

          65095a67c453db178b5735e7ecbeccbf1338ed75

          SHA256

          1f7d74e5ccf5681021323717359fb3efc6213d45ee84628c56f476f856477df4

          SHA512

          e02014e203c776bf8f11ebd48dc9abf132a8a907fa87e21b0f37306b0924f56dce99af7ed5fbcd862b3c6173c7cf09335c2fc1d4edc6f5753bd16bfdbab2d5de

        • memory/1068-77-0x0000000000230000-0x000000000026F000-memory.dmp

          Filesize

          252KB

        • memory/1068-81-0x0000000000270000-0x00000000002B0000-memory.dmp

          Filesize

          256KB

        • memory/1264-55-0x0000000070000000-0x0000000070039000-memory.dmp

          Filesize

          228KB

        • memory/1264-54-0x0000000075601000-0x0000000075603000-memory.dmp

          Filesize

          8KB

        • memory/1496-76-0x0000000074A21000-0x0000000074A23000-memory.dmp

          Filesize

          8KB

        • memory/1496-85-0x0000000000080000-0x00000000000AF000-memory.dmp

          Filesize

          188KB

        • memory/1496-86-0x0000000000440000-0x000000000047F000-memory.dmp

          Filesize

          252KB

        • memory/1496-111-0x0000000000080000-0x00000000000AF000-memory.dmp

          Filesize

          188KB