Analysis
-
max time kernel
186s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe
Resource
win10v2004-20220812-en
General
-
Target
ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe
-
Size
693KB
-
MD5
2052ab705ccfa85fb5774b37270da426
-
SHA1
e0b698e165da8097f7ee8e691d98ae0e11b09c66
-
SHA256
ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c
-
SHA512
8e6bd8f363503189ee9557f1eaf204ae4d488392c65aef72209b996727be4612bb5131144da555baca0372b359de849a89d241192774b622ad29c1655700bb05
-
SSDEEP
12288:AhkDgouVr2nxKkorvdRgQriDwOIxmxiZnYQE7PJc74a+jRfc3D:IRRJkcoQricOIQxiZY1pa+Jc3D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1692 system.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1572 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.exe system.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.exe system.exe -
Loads dropped DLL 4 IoCs
pid Process 916 ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe 916 ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe 916 ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe 916 ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\system.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\system.exe\"" system.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\system.exe\"" system.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run system.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\f: system.exe File opened (read-only) \??\j: system.exe File opened (read-only) \??\o: system.exe File opened (read-only) \??\w: system.exe File opened (read-only) \??\a: system.exe File opened (read-only) \??\b: system.exe File opened (read-only) \??\g: system.exe File opened (read-only) \??\t: system.exe File opened (read-only) \??\v: system.exe File opened (read-only) \??\y: system.exe File opened (read-only) \??\x: system.exe File opened (read-only) \??\h: system.exe File opened (read-only) \??\l: system.exe File opened (read-only) \??\m: system.exe File opened (read-only) \??\p: system.exe File opened (read-only) \??\q: system.exe File opened (read-only) \??\r: system.exe File opened (read-only) \??\z: system.exe File opened (read-only) \??\e: system.exe File opened (read-only) \??\i: system.exe File opened (read-only) \??\k: system.exe File opened (read-only) \??\n: system.exe File opened (read-only) \??\s: system.exe File opened (read-only) \??\u: system.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/916-55-0x0000000000400000-0x00000000004CA000-memory.dmp autoit_exe behavioral1/files/0x000a000000012319-56.dat autoit_exe behavioral1/files/0x000a000000012319-57.dat autoit_exe behavioral1/files/0x000a000000012319-59.dat autoit_exe behavioral1/files/0x000a000000012319-58.dat autoit_exe behavioral1/memory/916-60-0x0000000003960000-0x0000000003A2A000-memory.dmp autoit_exe behavioral1/files/0x000a000000012319-63.dat autoit_exe behavioral1/memory/916-65-0x0000000000400000-0x00000000004CA000-memory.dmp autoit_exe behavioral1/files/0x000a000000012319-66.dat autoit_exe behavioral1/memory/1692-68-0x0000000000400000-0x00000000004CA000-memory.dmp autoit_exe behavioral1/memory/1692-71-0x0000000000400000-0x00000000004CA000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 916 wrote to memory of 1692 916 ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe 28 PID 916 wrote to memory of 1692 916 ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe 28 PID 916 wrote to memory of 1692 916 ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe 28 PID 916 wrote to memory of 1692 916 ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe 28 PID 1692 wrote to memory of 1572 1692 system.exe 29 PID 1692 wrote to memory of 1572 1692 system.exe 29 PID 1692 wrote to memory of 1572 1692 system.exe 29 PID 1692 wrote to memory of 1572 1692 system.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe"C:\Users\Admin\AppData\Local\Temp\ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Roaming\system.exe"C:\Users\Admin\AppData\Roaming\system.exe" "del" C:\Users\Admin\AppData\Local\Temp\ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c.exe2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\system.exe" "system.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1572
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
693KB
MD52052ab705ccfa85fb5774b37270da426
SHA1e0b698e165da8097f7ee8e691d98ae0e11b09c66
SHA256ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c
SHA5128e6bd8f363503189ee9557f1eaf204ae4d488392c65aef72209b996727be4612bb5131144da555baca0372b359de849a89d241192774b622ad29c1655700bb05
-
Filesize
693KB
MD52052ab705ccfa85fb5774b37270da426
SHA1e0b698e165da8097f7ee8e691d98ae0e11b09c66
SHA256ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c
SHA5128e6bd8f363503189ee9557f1eaf204ae4d488392c65aef72209b996727be4612bb5131144da555baca0372b359de849a89d241192774b622ad29c1655700bb05
-
Filesize
11B
MD5301a3e5a5c08c60b2952122a97e1a838
SHA1c85da2ebd9e1098eed686b8c74016bee728bb942
SHA25689886e624db56b7f7e7a0a857fc7e63ebfffe9eb69b329489b79dd0a3e24f7fa
SHA512ce1dcdad347d6c8e6a798b915f8a8d8ac1be4851c0064ab62e80aa85103a472f402b688e94950099a812db1134917fe9d51a7dfa0504e0174e94acdad8ee34d9
-
Filesize
693KB
MD52052ab705ccfa85fb5774b37270da426
SHA1e0b698e165da8097f7ee8e691d98ae0e11b09c66
SHA256ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c
SHA5128e6bd8f363503189ee9557f1eaf204ae4d488392c65aef72209b996727be4612bb5131144da555baca0372b359de849a89d241192774b622ad29c1655700bb05
-
Filesize
693KB
MD52052ab705ccfa85fb5774b37270da426
SHA1e0b698e165da8097f7ee8e691d98ae0e11b09c66
SHA256ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c
SHA5128e6bd8f363503189ee9557f1eaf204ae4d488392c65aef72209b996727be4612bb5131144da555baca0372b359de849a89d241192774b622ad29c1655700bb05
-
Filesize
693KB
MD52052ab705ccfa85fb5774b37270da426
SHA1e0b698e165da8097f7ee8e691d98ae0e11b09c66
SHA256ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c
SHA5128e6bd8f363503189ee9557f1eaf204ae4d488392c65aef72209b996727be4612bb5131144da555baca0372b359de849a89d241192774b622ad29c1655700bb05
-
Filesize
693KB
MD52052ab705ccfa85fb5774b37270da426
SHA1e0b698e165da8097f7ee8e691d98ae0e11b09c66
SHA256ac17cdb8ca4f8294c9037067030d6af2700e7e4581c0970194ddae36e7574d1c
SHA5128e6bd8f363503189ee9557f1eaf204ae4d488392c65aef72209b996727be4612bb5131144da555baca0372b359de849a89d241192774b622ad29c1655700bb05