Analysis
-
max time kernel
51s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-11-2022 14:54
Static task
static1
Behavioral task
behavioral1
Sample
ceaeb5383e6c0589de9a73e409896478.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ceaeb5383e6c0589de9a73e409896478.exe
Resource
win10v2004-20220812-en
General
-
Target
ceaeb5383e6c0589de9a73e409896478.exe
-
Size
424KB
-
MD5
ceaeb5383e6c0589de9a73e409896478
-
SHA1
4cabab69582fa3fb2e131ec4d84ba41e70b2919b
-
SHA256
21659f7b55d30fd92b976f7eff8fc635d3e536926536ffeee79364afa68b77e9
-
SHA512
cde384735bdc0c8d259d506bf6e229bbf7b7974b06fdadfe9734d9d8de3dc3852558cc92e868cd1c2b7b04b0961d1ca8ba1b166314a7a6cfdced0ef176e9e5c7
-
SSDEEP
12288:kTjrxyMe1PKMK/lGRgOUqmq9kR6lhKXZ4juje8y:+j4fPKMK/cRgOnmq9g66GUe8y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1840 IntelGAS-Ver9.6.4.5.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1524 icacls.exe 1080 icacls.exe 680 icacls.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 icanhazip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1100 schtasks.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1100 1416 ceaeb5383e6c0589de9a73e409896478.exe 26 PID 1416 wrote to memory of 1100 1416 ceaeb5383e6c0589de9a73e409896478.exe 26 PID 1416 wrote to memory of 1100 1416 ceaeb5383e6c0589de9a73e409896478.exe 26 PID 1416 wrote to memory of 1100 1416 ceaeb5383e6c0589de9a73e409896478.exe 26 PID 1416 wrote to memory of 1524 1416 ceaeb5383e6c0589de9a73e409896478.exe 28 PID 1416 wrote to memory of 1524 1416 ceaeb5383e6c0589de9a73e409896478.exe 28 PID 1416 wrote to memory of 1524 1416 ceaeb5383e6c0589de9a73e409896478.exe 28 PID 1416 wrote to memory of 1524 1416 ceaeb5383e6c0589de9a73e409896478.exe 28 PID 1416 wrote to memory of 1080 1416 ceaeb5383e6c0589de9a73e409896478.exe 30 PID 1416 wrote to memory of 1080 1416 ceaeb5383e6c0589de9a73e409896478.exe 30 PID 1416 wrote to memory of 1080 1416 ceaeb5383e6c0589de9a73e409896478.exe 30 PID 1416 wrote to memory of 1080 1416 ceaeb5383e6c0589de9a73e409896478.exe 30 PID 1416 wrote to memory of 680 1416 ceaeb5383e6c0589de9a73e409896478.exe 32 PID 1416 wrote to memory of 680 1416 ceaeb5383e6c0589de9a73e409896478.exe 32 PID 1416 wrote to memory of 680 1416 ceaeb5383e6c0589de9a73e409896478.exe 32 PID 1416 wrote to memory of 680 1416 ceaeb5383e6c0589de9a73e409896478.exe 32 PID 1016 wrote to memory of 1840 1016 taskeng.exe 37 PID 1016 wrote to memory of 1840 1016 taskeng.exe 37 PID 1016 wrote to memory of 1840 1016 taskeng.exe 37 PID 1016 wrote to memory of 1840 1016 taskeng.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceaeb5383e6c0589de9a73e409896478.exe"C:\Users\Admin\AppData\Local\Temp\ceaeb5383e6c0589de9a73e409896478.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "Windows\IntelComputingToolkit\IntelGAS9.6.4.5." /TR "C:\ProgramData\IntelToolSkits\IntelGAS-Ver9.6.4.5.exe" /SC MINUTE2⤵
- Creates scheduled task(s)
PID:1100
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\IntelToolSkits" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:1524
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\IntelToolSkits" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:1080
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\IntelToolSkits" /inheritance:e /deny "adMnepoxyFEYWGOLmin:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:680
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B1AA2E60-106D-4697-A390-37D502606791} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\ProgramData\IntelToolSkits\IntelGAS-Ver9.6.4.5.exeC:\ProgramData\IntelToolSkits\IntelGAS-Ver9.6.4.5.exe2⤵
- Executes dropped EXE
PID:1840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD5ceaeb5383e6c0589de9a73e409896478
SHA14cabab69582fa3fb2e131ec4d84ba41e70b2919b
SHA25621659f7b55d30fd92b976f7eff8fc635d3e536926536ffeee79364afa68b77e9
SHA512cde384735bdc0c8d259d506bf6e229bbf7b7974b06fdadfe9734d9d8de3dc3852558cc92e868cd1c2b7b04b0961d1ca8ba1b166314a7a6cfdced0ef176e9e5c7
-
Filesize
424KB
MD5ceaeb5383e6c0589de9a73e409896478
SHA14cabab69582fa3fb2e131ec4d84ba41e70b2919b
SHA25621659f7b55d30fd92b976f7eff8fc635d3e536926536ffeee79364afa68b77e9
SHA512cde384735bdc0c8d259d506bf6e229bbf7b7974b06fdadfe9734d9d8de3dc3852558cc92e868cd1c2b7b04b0961d1ca8ba1b166314a7a6cfdced0ef176e9e5c7