Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 06:44
Static task
static1
Behavioral task
behavioral1
Sample
f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe
Resource
win10v2004-20220812-en
General
-
Target
f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe
-
Size
3.8MB
-
MD5
6de25756f2fa6198480b69594c7abec7
-
SHA1
21e99a9e96a23999584e6a11289a5b625231e249
-
SHA256
f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724
-
SHA512
b257c7cef887bb22ead07abfed562ecae4145b53123910a231eedad5a78035cd2606f753fe507d9a6f3c24363852833906eda93e8bc88e365879c7ae1c1b110c
-
SSDEEP
98304:QbY+W1mwQyEWxzhersAVkPOhHqobKQV+bY0:jf1gy3hzAKPCKo7P
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 592 CSGOHacksUndetected.com.exe -
resource yara_rule behavioral1/memory/948-66-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/948-65-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/948-67-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/948-70-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/948-71-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/948-87-0x0000000000400000-0x0000000000407000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1404 set thread context of 948 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 27 PID 1404 set thread context of 1896 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 1896 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe Token: SeDebugPrivilege 1896 RegAsm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 948 Cvtres.exe 1896 RegAsm.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1404 wrote to memory of 592 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 26 PID 1404 wrote to memory of 592 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 26 PID 1404 wrote to memory of 592 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 26 PID 1404 wrote to memory of 592 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 26 PID 1404 wrote to memory of 948 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 27 PID 1404 wrote to memory of 948 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 27 PID 1404 wrote to memory of 948 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 27 PID 1404 wrote to memory of 948 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 27 PID 1404 wrote to memory of 948 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 27 PID 1404 wrote to memory of 948 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 27 PID 1404 wrote to memory of 948 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 27 PID 1404 wrote to memory of 948 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 27 PID 1404 wrote to memory of 1896 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 28 PID 1404 wrote to memory of 1896 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 28 PID 1404 wrote to memory of 1896 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 28 PID 1404 wrote to memory of 1896 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 28 PID 1404 wrote to memory of 1896 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 28 PID 1404 wrote to memory of 1896 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 28 PID 1404 wrote to memory of 1896 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 28 PID 1404 wrote to memory of 1896 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 28 PID 1404 wrote to memory of 1896 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 28 PID 1404 wrote to memory of 1896 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 28 PID 1404 wrote to memory of 1896 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 28 PID 1404 wrote to memory of 1896 1404 f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe"C:\Users\Admin\AppData\Local\Temp\f784e6c5a6a6f034a51bd4d069752bd569e016a1d0a5fdbde8546ede0d4c7724.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Roaming\CSGOHacksUndetected.com.exe"C:\Users\Admin\AppData\Roaming\CSGOHacksUndetected.com.exe"2⤵
- Executes dropped EXE
PID:592
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\Cvtres.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\Cvtres.exe" -C:\Users\Admin\AppData\Roaming\K9FwLiiV\Glrznz6.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:948
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1896
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD502a099a444619eb6558fcd96d878862f
SHA11dc352f1b8ae1f5b989dcf6c1075f118bd5f522a
SHA25658b1641ca1162df5227ed816cae76515a0ec37fb17d02a81df92fe65a203129a
SHA512a3929e85e77fa935a75365c459554c2fc8e456d98fa8959b6a615933e876a10adcab2b3a7143b97175b78e9a583f7d125b07fd1e65a5d824de2bb800692175e2
-
Filesize
3.5MB
MD502a099a444619eb6558fcd96d878862f
SHA11dc352f1b8ae1f5b989dcf6c1075f118bd5f522a
SHA25658b1641ca1162df5227ed816cae76515a0ec37fb17d02a81df92fe65a203129a
SHA512a3929e85e77fa935a75365c459554c2fc8e456d98fa8959b6a615933e876a10adcab2b3a7143b97175b78e9a583f7d125b07fd1e65a5d824de2bb800692175e2
-
Filesize
3.5MB
MD502a099a444619eb6558fcd96d878862f
SHA11dc352f1b8ae1f5b989dcf6c1075f118bd5f522a
SHA25658b1641ca1162df5227ed816cae76515a0ec37fb17d02a81df92fe65a203129a
SHA512a3929e85e77fa935a75365c459554c2fc8e456d98fa8959b6a615933e876a10adcab2b3a7143b97175b78e9a583f7d125b07fd1e65a5d824de2bb800692175e2
-
Filesize
3.5MB
MD502a099a444619eb6558fcd96d878862f
SHA11dc352f1b8ae1f5b989dcf6c1075f118bd5f522a
SHA25658b1641ca1162df5227ed816cae76515a0ec37fb17d02a81df92fe65a203129a
SHA512a3929e85e77fa935a75365c459554c2fc8e456d98fa8959b6a615933e876a10adcab2b3a7143b97175b78e9a583f7d125b07fd1e65a5d824de2bb800692175e2