Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 17:44
Static task
static1
Behavioral task
behavioral1
Sample
41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe
Resource
win10v2004-20220812-en
General
-
Target
41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe
-
Size
690KB
-
MD5
83277dc9f232adb4e4abf34d57591de0
-
SHA1
14f3bf917cd3cf3d195be7b6c72ef37e502e5a31
-
SHA256
41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b
-
SHA512
b8c72b5021891b3dcff8a07b92f2cdb5dd5915ab667829e1b0080cc5c176033915ff9d041346aedbe71b640eaa502321ea0a39a5f07802778e6119b2b85dc6d2
-
SSDEEP
12288:d6vp0bhWjLK1hFAgJZCBg9YqR8K+4B5ZjizaXkl0dOheo5aMDPSZVHF2qE:d6vKbGMJZkq73fpizaUl0EhJDTSZVlJE
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1516-55-0x0000000001DE0000-0x0000000001F31000-memory.dmp upx behavioral1/memory/1516-59-0x0000000001DE0000-0x0000000001F31000-memory.dmp upx behavioral1/memory/1516-58-0x0000000001DE0000-0x0000000001F31000-memory.dmp upx behavioral1/memory/1516-62-0x0000000001DE0000-0x0000000001F31000-memory.dmp upx behavioral1/memory/1516-63-0x0000000001DE0000-0x0000000001F31000-memory.dmp upx behavioral1/memory/1612-66-0x0000000001DC0000-0x0000000001F11000-memory.dmp upx behavioral1/memory/1612-69-0x0000000001DC0000-0x0000000001F11000-memory.dmp upx behavioral1/memory/1612-70-0x0000000001DC0000-0x0000000001F11000-memory.dmp upx behavioral1/memory/1612-71-0x0000000001DC0000-0x0000000001F11000-memory.dmp upx behavioral1/memory/1612-73-0x0000000001DC0000-0x0000000001F11000-memory.dmp upx behavioral1/memory/1516-75-0x0000000001DE0000-0x0000000001F31000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is7103302.log 41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1516 41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe 1516 41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1516 41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1516 41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe 1516 41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1612 1516 41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe 27 PID 1516 wrote to memory of 1612 1516 41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe 27 PID 1516 wrote to memory of 1612 1516 41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe 27 PID 1516 wrote to memory of 1612 1516 41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe"C:\Users\Admin\AppData\Local\Temp\41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe"1⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe"C:\Users\Admin\AppData\Local\Temp\41919df79da85557d6b65d1e7a529c215fd28ddf9188363c8f083a85ba4ef01b.exe" /_ShowProgress2⤵PID:1612
-