Analysis
-
max time kernel
150s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 01:14
Static task
static1
Behavioral task
behavioral1
Sample
13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe
Resource
win7-20220812-en
General
-
Target
13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe
-
Size
178KB
-
MD5
0b62db064492dbaded5dd07fc9a508d0
-
SHA1
c7a8c3cb25aa63fc304cca8f30c780a0427e8e8b
-
SHA256
13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c
-
SHA512
e222eabbd621f263b6745f1498dc011d75bfd7686979fa5477b031c6546aa9df22d6e0ba93ba02de43858812e1bcf9b3d4d63f6e77e25eb4b01a2d8a949e843a
-
SSDEEP
3072:I7VNBmjq8Kmvn6rIVTYC7H2rAalUW4R6rv3p8WStxlQu2VCPwc:I7VzxYnWI6agAalr4UrPp8WStPQu285
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
REG.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 17 IoCs
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid process 1068 ping.exe 916 ping.exe 1296 ping.exe 580 ping.exe 1976 ping.exe 1840 ping.exe 2012 ping.exe 640 ping.exe 1120 ping.exe 1592 ping.exe 1476 ping.exe 1680 ping.exe 868 ping.exe 676 ping.exe 1628 ping.exe 1108 ping.exe 2032 ping.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exedescription pid process Token: SeDebugPrivilege 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exedescription pid process target process PID 1608 wrote to memory of 1976 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1976 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1976 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1976 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1068 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1068 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1068 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1068 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 916 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 916 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 916 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 916 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1840 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1840 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1840 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1840 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 640 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 640 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 640 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 640 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1296 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1296 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1296 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1296 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 2012 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 2012 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 2012 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 2012 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 676 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 676 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 676 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 676 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1628 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1628 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1628 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1628 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1120 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1120 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1120 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1120 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1576 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe attrib.exe PID 1608 wrote to memory of 1576 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe attrib.exe PID 1608 wrote to memory of 1576 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe attrib.exe PID 1608 wrote to memory of 1576 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe attrib.exe PID 1608 wrote to memory of 1544 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe REG.exe PID 1608 wrote to memory of 1544 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe REG.exe PID 1608 wrote to memory of 1544 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe REG.exe PID 1608 wrote to memory of 1544 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe REG.exe PID 1608 wrote to memory of 1592 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1592 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1592 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1592 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1476 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1476 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1476 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1476 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1108 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1108 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1108 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 1108 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 580 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 580 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 580 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe PID 1608 wrote to memory of 580 1608 13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe ping.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe"C:\Users\Admin\AppData\Local\Temp\13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" +s +h C:\Users\Admin\AppData\Local\Temp\13a58ff5a236a3986c66784f0ea4bc2b9dba906cbaa752f1d8df9d68e46bfc2c.exe2⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/580-72-0x0000000000000000-mapping.dmp
-
memory/640-61-0x0000000000000000-mapping.dmp
-
memory/676-64-0x0000000000000000-mapping.dmp
-
memory/868-75-0x0000000000000000-mapping.dmp
-
memory/916-59-0x0000000000000000-mapping.dmp
-
memory/1068-58-0x0000000000000000-mapping.dmp
-
memory/1108-71-0x0000000000000000-mapping.dmp
-
memory/1120-66-0x0000000000000000-mapping.dmp
-
memory/1296-62-0x0000000000000000-mapping.dmp
-
memory/1476-70-0x0000000000000000-mapping.dmp
-
memory/1544-68-0x0000000000000000-mapping.dmp
-
memory/1576-67-0x0000000000000000-mapping.dmp
-
memory/1592-69-0x0000000000000000-mapping.dmp
-
memory/1608-54-0x0000000075A91000-0x0000000075A93000-memory.dmpFilesize
8KB
-
memory/1608-56-0x00000000744E0000-0x0000000074A8B000-memory.dmpFilesize
5.7MB
-
memory/1608-55-0x00000000744E0000-0x0000000074A8B000-memory.dmpFilesize
5.7MB
-
memory/1628-65-0x0000000000000000-mapping.dmp
-
memory/1680-73-0x0000000000000000-mapping.dmp
-
memory/1840-60-0x0000000000000000-mapping.dmp
-
memory/1976-57-0x0000000000000000-mapping.dmp
-
memory/2012-63-0x0000000000000000-mapping.dmp
-
memory/2032-74-0x0000000000000000-mapping.dmp