Analysis
-
max time kernel
161s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 21:44
Static task
static1
Behavioral task
behavioral1
Sample
ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe
Resource
win10v2004-20220901-en
General
-
Target
ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe
-
Size
145KB
-
MD5
0e61bcd8d38578b68186f146914e92e0
-
SHA1
3ee7770f9a8e0c6c4a962659baa3082097fafcbc
-
SHA256
ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2
-
SHA512
1ba1abe81b25c6be41a198cf7b7ba76a9705da4e2f7d318d33cd85348a37fb6596464a9e5ca3dc40686f16101d8c2b7329cb5066c86a4fc8760e27b7c1c1b66d
-
SSDEEP
3072:Mae+scKB6+j2KkErn71HXeUg7wlT0uawqoNLboIVcjb8lERGl:lsjSKkqTgya8J
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt winlog.exe -
Executes dropped EXE 1 IoCs
pid Process 1672 winlog.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\winlog.EXE ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" winlog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\open\command winlog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" winlog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\explore winlog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" winlog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" winlog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open\command winlog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "C:\\Windows\\winlog.EXE %1" winlog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\ = "open" winlog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\explore\command\ = "C:\\Windows\\winlog.EXE %1" winlog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command winlog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command winlog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\explore\ = "?????(&X) " winlog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command winlog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vbsfile\shell\open\command winlog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive winlog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell winlog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\explore\command winlog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" winlog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt winlog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\open winlog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\open\ = "??(&O) " winlog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command winlog.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1672 winlog.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2028 ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe 1672 winlog.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1672 2028 ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe 27 PID 2028 wrote to memory of 1672 2028 ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe 27 PID 2028 wrote to memory of 1672 2028 ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe 27 PID 2028 wrote to memory of 1672 2028 ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe"C:\Users\Admin\AppData\Local\Temp\ad55f2bd3b19f725fb53e4dd13c80936dfbb2d8a14a7327d29b19ceb7cc61ef2.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\winlog.exe"C:\Windows\winlog.exe"2⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1672
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5e401ba63c7e3cb2942a1bb693c3e4232
SHA15c646e484e4860ce749dd29c5f5240679703bda5
SHA2565d2bb760b61acbe991f7a2db850570448de01671487e89312e9f3f3ca88a1d41
SHA512c9b25a1e182a763414a8533207115a4a9e5c0a72db61cc8f8b4a2f2f8e2abe78ed57f769f7db66b49c4b8f2b300de936a14faa9faa9b1262d1f242b2a13c8727