Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 21:17
Static task
static1
Behavioral task
behavioral1
Sample
26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe
Resource
win10v2004-20220812-en
General
-
Target
26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe
-
Size
1.3MB
-
MD5
aa565f2b01389e5c4d885dfeffde711a
-
SHA1
b29fc7ec174403f8ae24030be75aefc4e5ae2261
-
SHA256
26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d
-
SHA512
63cca4bf6bbf3060a27aa8dd9362cc1485b42df1ff65f5b9793ceea68b24a7ec68048f9651e99fbbd026072d7eff898f021d035848f9f5e4b2113a9c2f50bac5
-
SSDEEP
24576:bow4tqllwDrC518o0jsCKABZ+0A8H3pWFEvr0nfun:bo1tHC56RZKkEIH3QEvr
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 2N9134M9X74TR9OO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\8Z3G6Y747 = "C:\\ProgramData\\MKJ3LZ4\\8Z3G6Y747.exe" 2N9134M9X74TR9OO.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 980 8Z3G6Y747.exe 1460 2N9134M9X74TR9OO.exe 1140 5850FW55K6.exe -
Loads dropped DLL 6 IoCs
pid Process 1644 26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe 980 8Z3G6Y747.exe 980 8Z3G6Y747.exe 1460 2N9134M9X74TR9OO.exe 1460 2N9134M9X74TR9OO.exe 1140 5850FW55K6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 980 8Z3G6Y747.exe 980 8Z3G6Y747.exe 1460 2N9134M9X74TR9OO.exe 1460 2N9134M9X74TR9OO.exe 1460 2N9134M9X74TR9OO.exe 1460 2N9134M9X74TR9OO.exe 1140 5850FW55K6.exe 1140 5850FW55K6.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 980 8Z3G6Y747.exe Token: SeDebugPrivilege 1460 2N9134M9X74TR9OO.exe Token: SeDebugPrivilege 1140 5850FW55K6.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1644 26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe 1644 26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe 980 8Z3G6Y747.exe 980 8Z3G6Y747.exe 980 8Z3G6Y747.exe 980 8Z3G6Y747.exe 1460 2N9134M9X74TR9OO.exe 1460 2N9134M9X74TR9OO.exe 1460 2N9134M9X74TR9OO.exe 1460 2N9134M9X74TR9OO.exe 1140 5850FW55K6.exe 1140 5850FW55K6.exe 1140 5850FW55K6.exe 1140 5850FW55K6.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1644 wrote to memory of 980 1644 26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe 28 PID 1644 wrote to memory of 980 1644 26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe 28 PID 1644 wrote to memory of 980 1644 26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe 28 PID 1644 wrote to memory of 980 1644 26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe 28 PID 1644 wrote to memory of 980 1644 26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe 28 PID 1644 wrote to memory of 980 1644 26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe 28 PID 1644 wrote to memory of 980 1644 26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe 28 PID 980 wrote to memory of 1460 980 8Z3G6Y747.exe 30 PID 980 wrote to memory of 1460 980 8Z3G6Y747.exe 30 PID 980 wrote to memory of 1460 980 8Z3G6Y747.exe 30 PID 980 wrote to memory of 1460 980 8Z3G6Y747.exe 30 PID 980 wrote to memory of 1460 980 8Z3G6Y747.exe 30 PID 980 wrote to memory of 1460 980 8Z3G6Y747.exe 30 PID 980 wrote to memory of 1460 980 8Z3G6Y747.exe 30 PID 1460 wrote to memory of 1140 1460 2N9134M9X74TR9OO.exe 31 PID 1460 wrote to memory of 1140 1460 2N9134M9X74TR9OO.exe 31 PID 1460 wrote to memory of 1140 1460 2N9134M9X74TR9OO.exe 31 PID 1460 wrote to memory of 1140 1460 2N9134M9X74TR9OO.exe 31 PID 1460 wrote to memory of 1140 1460 2N9134M9X74TR9OO.exe 31 PID 1460 wrote to memory of 1140 1460 2N9134M9X74TR9OO.exe 31 PID 1460 wrote to memory of 1140 1460 2N9134M9X74TR9OO.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe"C:\Users\Admin\AppData\Local\Temp\26819f9bb856b8c436b55968719daccae2009d4585dd4497a04cdc95cec9161d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\ProgramData\MKJ3LZ4\8Z3G6Y747.exe"C:\ProgramData\MKJ3LZ4\8Z3G6Y747.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\2N9134M9X74TR9OO.exe433A5C50726F6772616D446174615C4D4B4A334C5A345C385A334736593734372E6578653⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\75635XB6UQPGZ50120W8Y8YWCT7AZ\5850FW55K6.exe433A5C50726F6772616D446174615C4D4B4A334C5A345C385A334736593734372E6578654⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1140
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD51ae2151ef56e383ca2800a0d05fc2c72
SHA1d6b284d32b8d3a7051472d4ed807dd258f4893bf
SHA256dbf690f30689770bddfa4f383a79d82e08d55a080ace8590ab2ef4b970055d37
SHA5123d279e12c8738d1716cdaf18c9bd8980e8cb4982279a209966aeedba593582ad523305c6d14f464c7ef8283fa4e905884dea1b385bda6cafcb2efd7b9ef5bf3a
-
Filesize
246B
MD5e7eb432528a6bda753423018d2f3cc50
SHA1b77e031c3e3041b82e6c59a22ca356fd61da59f1
SHA2565c72f4e124742f985530886dac1f50ed35cb973d616daea8c6dec0f4d91cbae9
SHA512d85197161cc37fcfd9d4c4cb477b269afeeed1240ee6e9d293804816c6cfce9a444cc3de31534e79be5aeddab399fb8370d88d6bb71bd182ee59fc4322dd1705
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
400KB
MD57f05f4d964cb2dd542d181ed5cfe17ca
SHA10c42c53f2af0425454b92aa06eb60107cdfe2bc5
SHA2568b3ed5818437f7ff5e1b18341849853ef345432ea3c8f9ce3d7587ad1674c1bc
SHA512b110e75abe457848a513cc09f7ea0a00ee8f41c3584ec042e12b74421c8aa0aefba3d8b69dbf0bb2d80272f444183902ab66af2abbdade287a3f0ecde86ecac3
-
Filesize
116B
MD59e600b1de6d8006995bef537c076674b
SHA1afa7a42186096d1b4833e2ed045bb5faf216ef86
SHA25643581b497508e6cdfe2e4da3bfeaf7b693281361e828863baf4365ff5015b8c1
SHA512c4f08c0e704fc4b844b0110854a7316415317108d5987bce5f92ca28a3476eb7e6ccc9e58344de739c6a631cd34974311a1cbd76227bd8acbb195431032e55f6
-
Filesize
158B
MD51ae2151ef56e383ca2800a0d05fc2c72
SHA1d6b284d32b8d3a7051472d4ed807dd258f4893bf
SHA256dbf690f30689770bddfa4f383a79d82e08d55a080ace8590ab2ef4b970055d37
SHA5123d279e12c8738d1716cdaf18c9bd8980e8cb4982279a209966aeedba593582ad523305c6d14f464c7ef8283fa4e905884dea1b385bda6cafcb2efd7b9ef5bf3a
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
246B
MD5e7eb432528a6bda753423018d2f3cc50
SHA1b77e031c3e3041b82e6c59a22ca356fd61da59f1
SHA2565c72f4e124742f985530886dac1f50ed35cb973d616daea8c6dec0f4d91cbae9
SHA512d85197161cc37fcfd9d4c4cb477b269afeeed1240ee6e9d293804816c6cfce9a444cc3de31534e79be5aeddab399fb8370d88d6bb71bd182ee59fc4322dd1705
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
400KB
MD57f05f4d964cb2dd542d181ed5cfe17ca
SHA10c42c53f2af0425454b92aa06eb60107cdfe2bc5
SHA2568b3ed5818437f7ff5e1b18341849853ef345432ea3c8f9ce3d7587ad1674c1bc
SHA512b110e75abe457848a513cc09f7ea0a00ee8f41c3584ec042e12b74421c8aa0aefba3d8b69dbf0bb2d80272f444183902ab66af2abbdade287a3f0ecde86ecac3
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
400KB
MD57f05f4d964cb2dd542d181ed5cfe17ca
SHA10c42c53f2af0425454b92aa06eb60107cdfe2bc5
SHA2568b3ed5818437f7ff5e1b18341849853ef345432ea3c8f9ce3d7587ad1674c1bc
SHA512b110e75abe457848a513cc09f7ea0a00ee8f41c3584ec042e12b74421c8aa0aefba3d8b69dbf0bb2d80272f444183902ab66af2abbdade287a3f0ecde86ecac3
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
400KB
MD57f05f4d964cb2dd542d181ed5cfe17ca
SHA10c42c53f2af0425454b92aa06eb60107cdfe2bc5
SHA2568b3ed5818437f7ff5e1b18341849853ef345432ea3c8f9ce3d7587ad1674c1bc
SHA512b110e75abe457848a513cc09f7ea0a00ee8f41c3584ec042e12b74421c8aa0aefba3d8b69dbf0bb2d80272f444183902ab66af2abbdade287a3f0ecde86ecac3
-
Filesize
400KB
MD57f05f4d964cb2dd542d181ed5cfe17ca
SHA10c42c53f2af0425454b92aa06eb60107cdfe2bc5
SHA2568b3ed5818437f7ff5e1b18341849853ef345432ea3c8f9ce3d7587ad1674c1bc
SHA512b110e75abe457848a513cc09f7ea0a00ee8f41c3584ec042e12b74421c8aa0aefba3d8b69dbf0bb2d80272f444183902ab66af2abbdade287a3f0ecde86ecac3