Analysis
-
max time kernel
150s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 16:41
Behavioral task
behavioral1
Sample
4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe
Resource
win10v2004-20220901-en
General
-
Target
4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe
-
Size
324KB
-
MD5
50490778e716b7e5fa96a4d17c1d58c6
-
SHA1
1c703b397a6730946f563f973e174cce26908103
-
SHA256
4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462
-
SHA512
e5a47475e3a0290f6ce46073840163232c23c0d200b53aee83efbd3b9344d6ba09f0d719ae29296b403140d604ecb9ad35812fcaf68c2b5be8027e8d21379ae3
-
SSDEEP
6144:dSqjfrzIxvgJ04rDCKJ04rDC0J04rDC8J04rDCa:jjoIjCKjC0jC8jC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1580 explorer.exe -
resource yara_rule behavioral1/files/0x000c0000000054a8-55.dat upx behavioral1/files/0x000c0000000054a8-56.dat upx behavioral1/files/0x000c0000000054a8-58.dat upx behavioral1/memory/2032-60-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1580-62-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1580-63-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2032-65-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/files/0x000c0000000054a8-66.dat upx -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8970.lnk explorer.exe -
Loads dropped DLL 3 IoCs
pid Process 2032 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe 2032 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe 1580 explorer.exe -
Enumerates connected drives 3 TTPs 44 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\j: explorer.exe File opened (read-only) \??\m: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\t: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\u: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\f: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\h: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\x: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\f: explorer.exe File opened (read-only) \??\i: explorer.exe File opened (read-only) \??\n: explorer.exe File opened (read-only) \??\l: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\p: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\e: explorer.exe File opened (read-only) \??\k: explorer.exe File opened (read-only) \??\l: explorer.exe File opened (read-only) \??\r: explorer.exe File opened (read-only) \??\z: explorer.exe File opened (read-only) \??\j: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\n: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\r: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\g: explorer.exe File opened (read-only) \??\h: explorer.exe File opened (read-only) \??\p: explorer.exe File opened (read-only) \??\s: explorer.exe File opened (read-only) \??\t: explorer.exe File opened (read-only) \??\e: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\i: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\y: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\s: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\v: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\o: explorer.exe File opened (read-only) \??\x: explorer.exe File opened (read-only) \??\q: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\w: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\z: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\m: explorer.exe File opened (read-only) \??\u: explorer.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\g: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\o: 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened (read-only) \??\y: explorer.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe File opened for modification C:\Program Files (x86)\Common Files\uiui8.dll explorer.exe File created C:\Program Files (x86)\Common Files\uiui8.dll explorer.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe 1580 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeLoadDriverPrivilege 2032 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe Token: SeLoadDriverPrivilege 1580 explorer.exe Token: SeDebugPrivilege 1580 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1580 explorer.exe 1580 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1580 2032 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe 28 PID 2032 wrote to memory of 1580 2032 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe 28 PID 2032 wrote to memory of 1580 2032 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe 28 PID 2032 wrote to memory of 1580 2032 4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe"C:\Users\Admin\AppData\Local\Temp\4a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1580
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD550490778e716b7e5fa96a4d17c1d58c6
SHA11c703b397a6730946f563f973e174cce26908103
SHA2564a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462
SHA512e5a47475e3a0290f6ce46073840163232c23c0d200b53aee83efbd3b9344d6ba09f0d719ae29296b403140d604ecb9ad35812fcaf68c2b5be8027e8d21379ae3
-
Filesize
324KB
MD550490778e716b7e5fa96a4d17c1d58c6
SHA11c703b397a6730946f563f973e174cce26908103
SHA2564a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462
SHA512e5a47475e3a0290f6ce46073840163232c23c0d200b53aee83efbd3b9344d6ba09f0d719ae29296b403140d604ecb9ad35812fcaf68c2b5be8027e8d21379ae3
-
Filesize
324KB
MD550490778e716b7e5fa96a4d17c1d58c6
SHA11c703b397a6730946f563f973e174cce26908103
SHA2564a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462
SHA512e5a47475e3a0290f6ce46073840163232c23c0d200b53aee83efbd3b9344d6ba09f0d719ae29296b403140d604ecb9ad35812fcaf68c2b5be8027e8d21379ae3
-
Filesize
324KB
MD550490778e716b7e5fa96a4d17c1d58c6
SHA11c703b397a6730946f563f973e174cce26908103
SHA2564a6c7b7b019ffd6a7d01c3677a35c6977d43c4dad483e3fe1ede9436ea27e462
SHA512e5a47475e3a0290f6ce46073840163232c23c0d200b53aee83efbd3b9344d6ba09f0d719ae29296b403140d604ecb9ad35812fcaf68c2b5be8027e8d21379ae3
-
Filesize
17KB
MD590b1f2289c3121611de1b47a54803e38
SHA18c1a78e9e777072aa60c365feb94b4eaee93ee8a
SHA25628267ad6e645fd72dcb1a218b709c85bcbe34ebb5468f9533b04ff34d7647e0c
SHA512216423e0647d4e40df227cb1bc6b6efddd2e84f5e9a58048219d7e59ec61f46e43e5e47bc4ea4485ef7af6282052113b0e68b73655c3245ec48d826fb8d905d6