Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 15:16

General

  • Target

    0f4e2b77884f1c8ea6133b4bfafba2957f9f44a1806c37f06ff1b3221109f0ae.exe

  • Size

    628KB

  • MD5

    0d038e9a2dd5bcc23a90319b83c968f5

  • SHA1

    6c99eb78a2f1d46116b84e8bfcfe3e2eedd9a47b

  • SHA256

    0f4e2b77884f1c8ea6133b4bfafba2957f9f44a1806c37f06ff1b3221109f0ae

  • SHA512

    3378a25377ceb28bd633d839fedad8a44581344d5e19da1c43ec3ec718ce666bcc2cf25092fd034fadd8fc8390d85616a959d5a64f4066a5169f518ece8609e0

  • SSDEEP

    12288:LyGEkI6AT7PQwXFrJzhdZiVyZoPpTC8QV3VgQ+kCjF:GGE96AT5F7x+PNDQVqB7p

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f4e2b77884f1c8ea6133b4bfafba2957f9f44a1806c37f06ff1b3221109f0ae.exe
    "C:\Users\Admin\AppData\Local\Temp\0f4e2b77884f1c8ea6133b4bfafba2957f9f44a1806c37f06ff1b3221109f0ae.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\0f4e2b77884f1c8ea6133b4bfafba2957f9f44a1806c37f06ff1b3221109f0ae.exe
      C:\Users\Admin\AppData\Local\Temp\0f4e2b77884f1c8ea6133b4bfafba2957f9f44a1806c37f06ff1b3221109f0ae.exe
      2⤵
      • Enumerates connected drives
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c \boot.bat
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1664
        • \??\c:\iexplorer.exe
          "c:\iexplorer.exe" /q /t:"c:\winboot\"
          4⤵
          • Executes dropped EXE
          PID:1172
        • \??\c:\winboot\svchost.exe
          "c:\winboot\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\winboot\wininit.exe
            "C:\winboot\wininit.exe" -o http://pool.bitclockers.com:8332 -u alonzo -p bibif
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:756
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ###############################axa /t REG_SZ /d C:\Windows\svchost.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:472
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ###############################axa /t REG_SZ /d C:\Windows\svchost.exe /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\boot.bat

    Filesize

    152B

    MD5

    d171de7b075669296c5a9165a3cd9143

    SHA1

    b6a7bad132acc9b69b15f98a869a99d04e9577fd

    SHA256

    88a485c6cf708cac69ea47adf1dbf3871bc69395ac3b0e0becdbabe06f7b4791

    SHA512

    4c0ecd125a6396d24461561201ff80bcd4dbb0afa2513e5394b73ebc92f30ce71aae36616334eb69049ea57aa81eb49dead1013c60b05136b4b268ea1e03dd8f

  • C:\iexplorer.exe

    Filesize

    391KB

    MD5

    4e5d6a842da37df7cec6f5d7e5196291

    SHA1

    22fe78ad372a54dd07ffa5ea92673974df79efb5

    SHA256

    7d491cb832c24357578050e16b0b1299b3638d52b92289fe6d4e388b7056e6e7

    SHA512

    c15f5d06d50f4844a1e2ef2ff516fea3fb4f2fe97fdadbd328783a954fca452c3b2422f6c766f18a92c93554580a4f8101151ba0f62c448deb9bd850553d2c31

  • C:\winboot\OpenCL.dll

    Filesize

    56KB

    MD5

    c4f271897205db916f46ce88f910eb5b

    SHA1

    6223d0d1146c8c3624bdb0db7576c5e915ead8a7

    SHA256

    9ae4be443b4c1bca28f3f5722756ef12a8c480c73d55020b253264dce801b772

    SHA512

    cc2c64bb37c2ccfe675031ddc962165fa313970f1f6c9721b3eab7110efde2fd7ab56720c6c0b83f067c85bc446ded3701d8777f0adcae835e36d20ca58d7622

  • C:\winboot\libcurl-4.dll

    Filesize

    310KB

    MD5

    43bd48bfb522be52479c5e0c2909c532

    SHA1

    deac3c1994cb510a72e02fef435cdb5dcc6e3957

    SHA256

    f72d7006e4bfa3d0af1f31b5c33d64f9f08048d789815ee810a81c0b97930af1

    SHA512

    75b31b09be4cc5a0fcce7dc890ed5c3c296ed45f76b427618651cec0e7d1773d6ca951789351055ea2e4df36896648b232081d16f18a0eb1bf7a92dc44ca5a00

  • C:\winboot\libpdcurses.dll

    Filesize

    145KB

    MD5

    9a9bc5d53331e893fcb7d15bfcd0879d

    SHA1

    d291432086ecab71025237e5d3599ca22222c680

    SHA256

    9eec7e5188d1a224325281e4d0e6e1d5f9f034f02bd1fadeb792d3612c72319e

    SHA512

    93f67d4cb8b1b617e9cd29c8956fed2cd5ed3ecb3af779597642100c2dc918c71fbc709d37f582ead2e8992ffa649b7e8456e881dcf12c05ce03bcce65348f8d

  • C:\winboot\libpthread-2.dll

    Filesize

    68KB

    MD5

    829f76e4d7a4cbb874a08be18671b4f8

    SHA1

    3e4d453b6892b002b176b085cc62d00a5f0a8500

    SHA256

    0f5e408cc64b3747068c4d932fb160164a241d11bad40d28a4e6454b76f68eac

    SHA512

    c7e9be4a660666503a0a91f1e24bb0fe4d9be369cdea29dffecafd1d7fc8eb00532bed09959adc4d5ff09d7a1828c710e21f94c2411f27672fe902b330b4995c

  • C:\winboot\svchost.exe

    Filesize

    12KB

    MD5

    e54a39cb202ecce0801045fcf7a4f6bf

    SHA1

    c383a839309c224d98074652175aca2761f56297

    SHA256

    a08ccdfcb6d94a73a6c8ab39d7381d71c19fe80aa1ba66697f9c727cb2926568

    SHA512

    de0f8d8ba04a7f1c6e50192256a87100442ff47122939d81d240e542db912e92db0f4ee327df577269d7f36f11fee46b75a30c11ff7b601931d24cc1d9dfc045

  • C:\winboot\wininit.exe

    Filesize

    270KB

    MD5

    cdbb867e5110a3fe857bb6ac645910f9

    SHA1

    7c20bccf177a95f71b93ff5bd94978a7307de154

    SHA256

    f6194148f49c793bebbfae5ac116f25a8e1ce015164a41518eafd650291493a1

    SHA512

    8ac051e65e571bb5d057d290b17735797fa3d60ae750cbd9e4a9c6186a48a84911c82b61f6818a4c2d4c477ab8967077c1db7f8a62a427b4951e78651152c80e

  • C:\winboot\wininit.exe

    Filesize

    270KB

    MD5

    cdbb867e5110a3fe857bb6ac645910f9

    SHA1

    7c20bccf177a95f71b93ff5bd94978a7307de154

    SHA256

    f6194148f49c793bebbfae5ac116f25a8e1ce015164a41518eafd650291493a1

    SHA512

    8ac051e65e571bb5d057d290b17735797fa3d60ae750cbd9e4a9c6186a48a84911c82b61f6818a4c2d4c477ab8967077c1db7f8a62a427b4951e78651152c80e

  • \??\c:\iexplorer.exe

    Filesize

    391KB

    MD5

    4e5d6a842da37df7cec6f5d7e5196291

    SHA1

    22fe78ad372a54dd07ffa5ea92673974df79efb5

    SHA256

    7d491cb832c24357578050e16b0b1299b3638d52b92289fe6d4e388b7056e6e7

    SHA512

    c15f5d06d50f4844a1e2ef2ff516fea3fb4f2fe97fdadbd328783a954fca452c3b2422f6c766f18a92c93554580a4f8101151ba0f62c448deb9bd850553d2c31

  • \??\c:\winboot\WhileIdle.conf

    Filesize

    86B

    MD5

    fd088a0b02da8bc1c6c76d20c72236c2

    SHA1

    8d614c97d2a79e7fc5a8ed8322fcdac5278f1760

    SHA256

    fc6c1ec98ac56e22ba14042bafd3f5370b892cf3f35c8cc25d086266a0387652

    SHA512

    d17c147e08e7928fe628be73a860cacb9fd03d4294377060cdc3323c520097ba4bca2528056c9e0c896f8d99dd8a11d33ebcaf9e4d27d5e826a5bda00a04b1a3

  • \??\c:\winboot\svchost.exe

    Filesize

    12KB

    MD5

    e54a39cb202ecce0801045fcf7a4f6bf

    SHA1

    c383a839309c224d98074652175aca2761f56297

    SHA256

    a08ccdfcb6d94a73a6c8ab39d7381d71c19fe80aa1ba66697f9c727cb2926568

    SHA512

    de0f8d8ba04a7f1c6e50192256a87100442ff47122939d81d240e542db912e92db0f4ee327df577269d7f36f11fee46b75a30c11ff7b601931d24cc1d9dfc045

  • \winboot\OpenCL.dll

    Filesize

    56KB

    MD5

    c4f271897205db916f46ce88f910eb5b

    SHA1

    6223d0d1146c8c3624bdb0db7576c5e915ead8a7

    SHA256

    9ae4be443b4c1bca28f3f5722756ef12a8c480c73d55020b253264dce801b772

    SHA512

    cc2c64bb37c2ccfe675031ddc962165fa313970f1f6c9721b3eab7110efde2fd7ab56720c6c0b83f067c85bc446ded3701d8777f0adcae835e36d20ca58d7622

  • \winboot\libcurl-4.dll

    Filesize

    310KB

    MD5

    43bd48bfb522be52479c5e0c2909c532

    SHA1

    deac3c1994cb510a72e02fef435cdb5dcc6e3957

    SHA256

    f72d7006e4bfa3d0af1f31b5c33d64f9f08048d789815ee810a81c0b97930af1

    SHA512

    75b31b09be4cc5a0fcce7dc890ed5c3c296ed45f76b427618651cec0e7d1773d6ca951789351055ea2e4df36896648b232081d16f18a0eb1bf7a92dc44ca5a00

  • \winboot\libpdcurses.dll

    Filesize

    145KB

    MD5

    9a9bc5d53331e893fcb7d15bfcd0879d

    SHA1

    d291432086ecab71025237e5d3599ca22222c680

    SHA256

    9eec7e5188d1a224325281e4d0e6e1d5f9f034f02bd1fadeb792d3612c72319e

    SHA512

    93f67d4cb8b1b617e9cd29c8956fed2cd5ed3ecb3af779597642100c2dc918c71fbc709d37f582ead2e8992ffa649b7e8456e881dcf12c05ce03bcce65348f8d

  • \winboot\libpthread-2.dll

    Filesize

    68KB

    MD5

    829f76e4d7a4cbb874a08be18671b4f8

    SHA1

    3e4d453b6892b002b176b085cc62d00a5f0a8500

    SHA256

    0f5e408cc64b3747068c4d932fb160164a241d11bad40d28a4e6454b76f68eac

    SHA512

    c7e9be4a660666503a0a91f1e24bb0fe4d9be369cdea29dffecafd1d7fc8eb00532bed09959adc4d5ff09d7a1828c710e21f94c2411f27672fe902b330b4995c

  • \winboot\svchost.exe

    Filesize

    12KB

    MD5

    e54a39cb202ecce0801045fcf7a4f6bf

    SHA1

    c383a839309c224d98074652175aca2761f56297

    SHA256

    a08ccdfcb6d94a73a6c8ab39d7381d71c19fe80aa1ba66697f9c727cb2926568

    SHA512

    de0f8d8ba04a7f1c6e50192256a87100442ff47122939d81d240e542db912e92db0f4ee327df577269d7f36f11fee46b75a30c11ff7b601931d24cc1d9dfc045

  • \winboot\svchost.exe

    Filesize

    12KB

    MD5

    e54a39cb202ecce0801045fcf7a4f6bf

    SHA1

    c383a839309c224d98074652175aca2761f56297

    SHA256

    a08ccdfcb6d94a73a6c8ab39d7381d71c19fe80aa1ba66697f9c727cb2926568

    SHA512

    de0f8d8ba04a7f1c6e50192256a87100442ff47122939d81d240e542db912e92db0f4ee327df577269d7f36f11fee46b75a30c11ff7b601931d24cc1d9dfc045

  • \winboot\svchost.exe

    Filesize

    12KB

    MD5

    e54a39cb202ecce0801045fcf7a4f6bf

    SHA1

    c383a839309c224d98074652175aca2761f56297

    SHA256

    a08ccdfcb6d94a73a6c8ab39d7381d71c19fe80aa1ba66697f9c727cb2926568

    SHA512

    de0f8d8ba04a7f1c6e50192256a87100442ff47122939d81d240e542db912e92db0f4ee327df577269d7f36f11fee46b75a30c11ff7b601931d24cc1d9dfc045

  • \winboot\svchost.exe

    Filesize

    12KB

    MD5

    e54a39cb202ecce0801045fcf7a4f6bf

    SHA1

    c383a839309c224d98074652175aca2761f56297

    SHA256

    a08ccdfcb6d94a73a6c8ab39d7381d71c19fe80aa1ba66697f9c727cb2926568

    SHA512

    de0f8d8ba04a7f1c6e50192256a87100442ff47122939d81d240e542db912e92db0f4ee327df577269d7f36f11fee46b75a30c11ff7b601931d24cc1d9dfc045

  • \winboot\wininit.exe

    Filesize

    270KB

    MD5

    cdbb867e5110a3fe857bb6ac645910f9

    SHA1

    7c20bccf177a95f71b93ff5bd94978a7307de154

    SHA256

    f6194148f49c793bebbfae5ac116f25a8e1ce015164a41518eafd650291493a1

    SHA512

    8ac051e65e571bb5d057d290b17735797fa3d60ae750cbd9e4a9c6186a48a84911c82b61f6818a4c2d4c477ab8967077c1db7f8a62a427b4951e78651152c80e

  • \winboot\wininit.exe

    Filesize

    270KB

    MD5

    cdbb867e5110a3fe857bb6ac645910f9

    SHA1

    7c20bccf177a95f71b93ff5bd94978a7307de154

    SHA256

    f6194148f49c793bebbfae5ac116f25a8e1ce015164a41518eafd650291493a1

    SHA512

    8ac051e65e571bb5d057d290b17735797fa3d60ae750cbd9e4a9c6186a48a84911c82b61f6818a4c2d4c477ab8967077c1db7f8a62a427b4951e78651152c80e

  • \winboot\wininit.exe

    Filesize

    270KB

    MD5

    cdbb867e5110a3fe857bb6ac645910f9

    SHA1

    7c20bccf177a95f71b93ff5bd94978a7307de154

    SHA256

    f6194148f49c793bebbfae5ac116f25a8e1ce015164a41518eafd650291493a1

    SHA512

    8ac051e65e571bb5d057d290b17735797fa3d60ae750cbd9e4a9c6186a48a84911c82b61f6818a4c2d4c477ab8967077c1db7f8a62a427b4951e78651152c80e

  • \winboot\wininit.exe

    Filesize

    270KB

    MD5

    cdbb867e5110a3fe857bb6ac645910f9

    SHA1

    7c20bccf177a95f71b93ff5bd94978a7307de154

    SHA256

    f6194148f49c793bebbfae5ac116f25a8e1ce015164a41518eafd650291493a1

    SHA512

    8ac051e65e571bb5d057d290b17735797fa3d60ae750cbd9e4a9c6186a48a84911c82b61f6818a4c2d4c477ab8967077c1db7f8a62a427b4951e78651152c80e

  • memory/756-108-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/756-104-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/756-114-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/756-113-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/756-112-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/756-111-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/756-103-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/756-110-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/756-109-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/756-102-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/756-107-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/756-106-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/756-105-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1456-54-0x0000000075B51000-0x0000000075B53000-memory.dmp

    Filesize

    8KB

  • memory/1456-57-0x0000000002890000-0x00000000038F2000-memory.dmp

    Filesize

    16.4MB

  • memory/1536-84-0x0000000072DD0000-0x000000007337B000-memory.dmp

    Filesize

    5.7MB

  • memory/1536-115-0x0000000072DD0000-0x000000007337B000-memory.dmp

    Filesize

    5.7MB

  • memory/1616-60-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/1616-67-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB