Analysis
-
max time kernel
163s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 00:49
Static task
static1
Behavioral task
behavioral1
Sample
457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe
Resource
win10v2004-20220901-en
General
-
Target
457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe
-
Size
372KB
-
MD5
0669e20bc2b7413d6922703062e062c3
-
SHA1
91d27f75ddfd7b245b6c09f2ecaab8c5ab7e4a11
-
SHA256
457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565
-
SHA512
a1c46657e77cd489f9c90672cbb33394066ec54735cb3ca203d4b1e1e1a4aba2177e5d886d1031b8367c674a2f03b0243038ef6f5c607d24f38a94094bda7b38
-
SSDEEP
6144:pl+Cd34MXtksceFm9aqFKT6Gb8iz/DCaiCJPoel9WenNaH+VJ91sXgpEVGP:K/qksceSYjv+alPoel9/04eAP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 660 server.exe 1796 server.exe -
Deletes itself 1 IoCs
pid Process 1632 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1696 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 1696 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1560 set thread context of 1696 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 28 PID 660 set thread context of 1796 660 server.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 660 server.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1560 wrote to memory of 1696 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 28 PID 1560 wrote to memory of 1696 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 28 PID 1560 wrote to memory of 1696 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 28 PID 1560 wrote to memory of 1696 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 28 PID 1560 wrote to memory of 1696 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 28 PID 1560 wrote to memory of 1696 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 28 PID 1560 wrote to memory of 1696 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 28 PID 1560 wrote to memory of 1696 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 28 PID 1560 wrote to memory of 1696 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 28 PID 1560 wrote to memory of 1696 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 28 PID 1560 wrote to memory of 1696 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 28 PID 1560 wrote to memory of 1696 1560 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 28 PID 1696 wrote to memory of 660 1696 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 29 PID 1696 wrote to memory of 660 1696 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 29 PID 1696 wrote to memory of 660 1696 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 29 PID 1696 wrote to memory of 660 1696 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 29 PID 1696 wrote to memory of 1632 1696 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 30 PID 1696 wrote to memory of 1632 1696 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 30 PID 1696 wrote to memory of 1632 1696 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 30 PID 1696 wrote to memory of 1632 1696 457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe 30 PID 660 wrote to memory of 1796 660 server.exe 32 PID 660 wrote to memory of 1796 660 server.exe 32 PID 660 wrote to memory of 1796 660 server.exe 32 PID 660 wrote to memory of 1796 660 server.exe 32 PID 660 wrote to memory of 1796 660 server.exe 32 PID 660 wrote to memory of 1796 660 server.exe 32 PID 660 wrote to memory of 1796 660 server.exe 32 PID 660 wrote to memory of 1796 660 server.exe 32 PID 660 wrote to memory of 1796 660 server.exe 32 PID 660 wrote to memory of 1796 660 server.exe 32 PID 660 wrote to memory of 1796 660 server.exe 32 PID 660 wrote to memory of 1796 660 server.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe"C:\Users\Admin\AppData\Local\Temp\457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exeC:\Users\Admin\AppData\Local\Temp\457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\server.exe"C:\Users\Admin\AppData\Local\server.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\server.exeC:\Users\Admin\AppData\Local\server.exe4⤵
- Executes dropped EXE
PID:1796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\melt.bat" "3⤵
- Deletes itself
PID:1632
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD5e8ece8d98498b8d7e86875c52d09269a
SHA1599961219a289c602c03e057975c02df3b85eb1b
SHA25663f2fa7a7f4734fbb87050690f9bf26f3a5e0577f9c4eef965431d61e3ca95e4
SHA5128e42b469a0d910231d630977830a3900c7929d03e4a658ba050089afaea8b8356afd0cd142617bafe403597a25a03d155ff50c9e84064ee9a4768571bf09c6de
-
Filesize
372KB
MD50669e20bc2b7413d6922703062e062c3
SHA191d27f75ddfd7b245b6c09f2ecaab8c5ab7e4a11
SHA256457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565
SHA512a1c46657e77cd489f9c90672cbb33394066ec54735cb3ca203d4b1e1e1a4aba2177e5d886d1031b8367c674a2f03b0243038ef6f5c607d24f38a94094bda7b38
-
Filesize
372KB
MD50669e20bc2b7413d6922703062e062c3
SHA191d27f75ddfd7b245b6c09f2ecaab8c5ab7e4a11
SHA256457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565
SHA512a1c46657e77cd489f9c90672cbb33394066ec54735cb3ca203d4b1e1e1a4aba2177e5d886d1031b8367c674a2f03b0243038ef6f5c607d24f38a94094bda7b38
-
Filesize
372KB
MD50669e20bc2b7413d6922703062e062c3
SHA191d27f75ddfd7b245b6c09f2ecaab8c5ab7e4a11
SHA256457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565
SHA512a1c46657e77cd489f9c90672cbb33394066ec54735cb3ca203d4b1e1e1a4aba2177e5d886d1031b8367c674a2f03b0243038ef6f5c607d24f38a94094bda7b38
-
Filesize
372KB
MD50669e20bc2b7413d6922703062e062c3
SHA191d27f75ddfd7b245b6c09f2ecaab8c5ab7e4a11
SHA256457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565
SHA512a1c46657e77cd489f9c90672cbb33394066ec54735cb3ca203d4b1e1e1a4aba2177e5d886d1031b8367c674a2f03b0243038ef6f5c607d24f38a94094bda7b38
-
Filesize
372KB
MD50669e20bc2b7413d6922703062e062c3
SHA191d27f75ddfd7b245b6c09f2ecaab8c5ab7e4a11
SHA256457e574c618ce574e4da279a4b6532cebed956ee0a430f6f48b60e9aef971565
SHA512a1c46657e77cd489f9c90672cbb33394066ec54735cb3ca203d4b1e1e1a4aba2177e5d886d1031b8367c674a2f03b0243038ef6f5c607d24f38a94094bda7b38