Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe
Resource
win10v2004-20220901-en
General
-
Target
ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe
-
Size
918KB
-
MD5
2253ee7219e9c6c8e4a3ffdf918dbdc4
-
SHA1
4629fdf6f075ff7648d0225d43b1d312413551ec
-
SHA256
ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739
-
SHA512
500b8244c83195833a115f7b5f070154e62ed589243f8fbeb8990c8ee6160520962adbb3f21277d57d0bd522b2cd0e7f2340efd6155fb36415afc627790a51e9
-
SSDEEP
24576:kTkM/ti22C/1MOB13rpEfYjtAZAybWyj/qpwKSZsVKp:kTXl1/zdOwjfyKyuSCc
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 1268 Rundll32.exe 4 1268 Rundll32.exe -
Executes dropped EXE 2 IoCs
pid Process 980 two.exe 1752 game.exe -
Sets DLL path for service in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Abcdef Hijklmno Qrs\Parameters\ServiceDll = "C:\\Windows\\148714629.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Abcdef Hijklmno Qrs\Parameters\ServiceDll = "C:\\Windows\\148693020.dll" two.exe -
Loads dropped DLL 11 IoCs
pid Process 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 980 two.exe 980 two.exe 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 820 rundll32.exe 820 rundll32.exe 820 rundll32.exe 820 rundll32.exe 1752 game.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\LruNpstf.dsy two.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\148693020.dll two.exe File opened for modification C:\Windows\148693020.dll two.exe File created C:\Windows\148714629.dll rundll32.exe File opened for modification C:\Windows\148714629.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1752 game.exe 1268 Rundll32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1696 wrote to memory of 980 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 27 PID 1696 wrote to memory of 980 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 27 PID 1696 wrote to memory of 980 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 27 PID 1696 wrote to memory of 980 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 27 PID 1696 wrote to memory of 980 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 27 PID 1696 wrote to memory of 980 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 27 PID 1696 wrote to memory of 980 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 27 PID 980 wrote to memory of 820 980 two.exe 32 PID 980 wrote to memory of 820 980 two.exe 32 PID 980 wrote to memory of 820 980 two.exe 32 PID 980 wrote to memory of 820 980 two.exe 32 PID 980 wrote to memory of 820 980 two.exe 32 PID 980 wrote to memory of 820 980 two.exe 32 PID 980 wrote to memory of 820 980 two.exe 32 PID 1696 wrote to memory of 1752 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 33 PID 1696 wrote to memory of 1752 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 33 PID 1696 wrote to memory of 1752 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 33 PID 1696 wrote to memory of 1752 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 33 PID 1696 wrote to memory of 1752 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 33 PID 1696 wrote to memory of 1752 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 33 PID 1696 wrote to memory of 1752 1696 ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe 33 PID 1620 wrote to memory of 1268 1620 svchost.exe 36 PID 1620 wrote to memory of 1268 1620 svchost.exe 36 PID 1620 wrote to memory of 1268 1620 svchost.exe 36 PID 1620 wrote to memory of 1268 1620 svchost.exe 36 PID 1620 wrote to memory of 1268 1620 svchost.exe 36 PID 1620 wrote to memory of 1268 1620 svchost.exe 36 PID 1620 wrote to memory of 1268 1620 svchost.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe"C:\Users\Admin\AppData\Local\Temp\ad5da74726da260ba4c21420d30972de623753cccb9555fb948e692b331b9739.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\two.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\two.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\\84963696.dll,Install3⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in Windows directory
PID:820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\game.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\game.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1752
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Abcdef Hijklmno Qrs"1⤵PID:1160
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Abcdef Hijklmno Qrs"1⤵PID:1732
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Abcdef Hijklmno Qrs"1⤵PID:320
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Abcdef Hijklmno Qrs"1⤵PID:456
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Abcdef Hijklmno Qrs"1⤵PID:364
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Abcdef Hijklmno Qrs"1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe c:\windows\148714~1.DLL,Launch Abcdef Hijklmno Qrs2⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
PID:1268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.2MB
MD5018b5716441fbdd8a21450b9567cbdce
SHA151d3d5ad1e6e7b662d4f6f9bc36cb07bcf1f240a
SHA256db6f6dbc3de738eeac31751e23ba7ee4cd2c8a7a2f9d0d3c9ee0677458426287
SHA5120b2a963e45c2230087ff091fe52a96afffe16cf7a52a076313eba4f9992623071abcfc52100400926f74ca2e369709d14b2e18478258b7daded942e70c15aea8
-
Filesize
816KB
MD57dab267a58ea628971d7114e5453df99
SHA11491fc5c57bcbd8afb9c6490fbd580a81090ccb8
SHA2564c83ce5f7ba26fd344fff2c7cabd18e3ede66cd3086928a2eb88cc89c7989c1e
SHA512d95ba4f130bee3d0e4384805eb6d7df9178222be76d52c395b7126dc785506a17e3645dd3e7c628cc1bf17dd13c6ef259cce8b1a8914c9b84e382ac078e91cf6
-
Filesize
816KB
MD57dab267a58ea628971d7114e5453df99
SHA11491fc5c57bcbd8afb9c6490fbd580a81090ccb8
SHA2564c83ce5f7ba26fd344fff2c7cabd18e3ede66cd3086928a2eb88cc89c7989c1e
SHA512d95ba4f130bee3d0e4384805eb6d7df9178222be76d52c395b7126dc785506a17e3645dd3e7c628cc1bf17dd13c6ef259cce8b1a8914c9b84e382ac078e91cf6
-
Filesize
166KB
MD58ed284fca28b9edc56dc4db9a47ab139
SHA10cb9f31aad8778b1960fc7f0e42c901ad2c77502
SHA2563ce6ada543c23e7fc28f3e63c9602c4241864fcbfab154a686063dc57ad3ea86
SHA512d93b46e9be25a9d610d17f7945dbb55b4923e102c0adfd0d1eaf9538657361fa088bed5673af7c59444818ffcf91db3c161b1090d3dfa1adb4fee9c2878fa8f0
-
Filesize
166KB
MD58ed284fca28b9edc56dc4db9a47ab139
SHA10cb9f31aad8778b1960fc7f0e42c901ad2c77502
SHA2563ce6ada543c23e7fc28f3e63c9602c4241864fcbfab154a686063dc57ad3ea86
SHA512d93b46e9be25a9d610d17f7945dbb55b4923e102c0adfd0d1eaf9538657361fa088bed5673af7c59444818ffcf91db3c161b1090d3dfa1adb4fee9c2878fa8f0
-
Filesize
166KB
MD58ed284fca28b9edc56dc4db9a47ab139
SHA10cb9f31aad8778b1960fc7f0e42c901ad2c77502
SHA2563ce6ada543c23e7fc28f3e63c9602c4241864fcbfab154a686063dc57ad3ea86
SHA512d93b46e9be25a9d610d17f7945dbb55b4923e102c0adfd0d1eaf9538657361fa088bed5673af7c59444818ffcf91db3c161b1090d3dfa1adb4fee9c2878fa8f0
-
Filesize
7.2MB
MD5018b5716441fbdd8a21450b9567cbdce
SHA151d3d5ad1e6e7b662d4f6f9bc36cb07bcf1f240a
SHA256db6f6dbc3de738eeac31751e23ba7ee4cd2c8a7a2f9d0d3c9ee0677458426287
SHA5120b2a963e45c2230087ff091fe52a96afffe16cf7a52a076313eba4f9992623071abcfc52100400926f74ca2e369709d14b2e18478258b7daded942e70c15aea8
-
Filesize
7.2MB
MD5018b5716441fbdd8a21450b9567cbdce
SHA151d3d5ad1e6e7b662d4f6f9bc36cb07bcf1f240a
SHA256db6f6dbc3de738eeac31751e23ba7ee4cd2c8a7a2f9d0d3c9ee0677458426287
SHA5120b2a963e45c2230087ff091fe52a96afffe16cf7a52a076313eba4f9992623071abcfc52100400926f74ca2e369709d14b2e18478258b7daded942e70c15aea8
-
Filesize
7.2MB
MD5018b5716441fbdd8a21450b9567cbdce
SHA151d3d5ad1e6e7b662d4f6f9bc36cb07bcf1f240a
SHA256db6f6dbc3de738eeac31751e23ba7ee4cd2c8a7a2f9d0d3c9ee0677458426287
SHA5120b2a963e45c2230087ff091fe52a96afffe16cf7a52a076313eba4f9992623071abcfc52100400926f74ca2e369709d14b2e18478258b7daded942e70c15aea8
-
Filesize
7.2MB
MD5018b5716441fbdd8a21450b9567cbdce
SHA151d3d5ad1e6e7b662d4f6f9bc36cb07bcf1f240a
SHA256db6f6dbc3de738eeac31751e23ba7ee4cd2c8a7a2f9d0d3c9ee0677458426287
SHA5120b2a963e45c2230087ff091fe52a96afffe16cf7a52a076313eba4f9992623071abcfc52100400926f74ca2e369709d14b2e18478258b7daded942e70c15aea8
-
Filesize
7.2MB
MD5018b5716441fbdd8a21450b9567cbdce
SHA151d3d5ad1e6e7b662d4f6f9bc36cb07bcf1f240a
SHA256db6f6dbc3de738eeac31751e23ba7ee4cd2c8a7a2f9d0d3c9ee0677458426287
SHA5120b2a963e45c2230087ff091fe52a96afffe16cf7a52a076313eba4f9992623071abcfc52100400926f74ca2e369709d14b2e18478258b7daded942e70c15aea8
-
Filesize
7.2MB
MD5018b5716441fbdd8a21450b9567cbdce
SHA151d3d5ad1e6e7b662d4f6f9bc36cb07bcf1f240a
SHA256db6f6dbc3de738eeac31751e23ba7ee4cd2c8a7a2f9d0d3c9ee0677458426287
SHA5120b2a963e45c2230087ff091fe52a96afffe16cf7a52a076313eba4f9992623071abcfc52100400926f74ca2e369709d14b2e18478258b7daded942e70c15aea8
-
Filesize
816KB
MD57dab267a58ea628971d7114e5453df99
SHA11491fc5c57bcbd8afb9c6490fbd580a81090ccb8
SHA2564c83ce5f7ba26fd344fff2c7cabd18e3ede66cd3086928a2eb88cc89c7989c1e
SHA512d95ba4f130bee3d0e4384805eb6d7df9178222be76d52c395b7126dc785506a17e3645dd3e7c628cc1bf17dd13c6ef259cce8b1a8914c9b84e382ac078e91cf6
-
Filesize
816KB
MD57dab267a58ea628971d7114e5453df99
SHA11491fc5c57bcbd8afb9c6490fbd580a81090ccb8
SHA2564c83ce5f7ba26fd344fff2c7cabd18e3ede66cd3086928a2eb88cc89c7989c1e
SHA512d95ba4f130bee3d0e4384805eb6d7df9178222be76d52c395b7126dc785506a17e3645dd3e7c628cc1bf17dd13c6ef259cce8b1a8914c9b84e382ac078e91cf6
-
Filesize
816KB
MD57dab267a58ea628971d7114e5453df99
SHA11491fc5c57bcbd8afb9c6490fbd580a81090ccb8
SHA2564c83ce5f7ba26fd344fff2c7cabd18e3ede66cd3086928a2eb88cc89c7989c1e
SHA512d95ba4f130bee3d0e4384805eb6d7df9178222be76d52c395b7126dc785506a17e3645dd3e7c628cc1bf17dd13c6ef259cce8b1a8914c9b84e382ac078e91cf6
-
Filesize
166KB
MD58ed284fca28b9edc56dc4db9a47ab139
SHA10cb9f31aad8778b1960fc7f0e42c901ad2c77502
SHA2563ce6ada543c23e7fc28f3e63c9602c4241864fcbfab154a686063dc57ad3ea86
SHA512d93b46e9be25a9d610d17f7945dbb55b4923e102c0adfd0d1eaf9538657361fa088bed5673af7c59444818ffcf91db3c161b1090d3dfa1adb4fee9c2878fa8f0
-
Filesize
166KB
MD58ed284fca28b9edc56dc4db9a47ab139
SHA10cb9f31aad8778b1960fc7f0e42c901ad2c77502
SHA2563ce6ada543c23e7fc28f3e63c9602c4241864fcbfab154a686063dc57ad3ea86
SHA512d93b46e9be25a9d610d17f7945dbb55b4923e102c0adfd0d1eaf9538657361fa088bed5673af7c59444818ffcf91db3c161b1090d3dfa1adb4fee9c2878fa8f0
-
Filesize
166KB
MD58ed284fca28b9edc56dc4db9a47ab139
SHA10cb9f31aad8778b1960fc7f0e42c901ad2c77502
SHA2563ce6ada543c23e7fc28f3e63c9602c4241864fcbfab154a686063dc57ad3ea86
SHA512d93b46e9be25a9d610d17f7945dbb55b4923e102c0adfd0d1eaf9538657361fa088bed5673af7c59444818ffcf91db3c161b1090d3dfa1adb4fee9c2878fa8f0