Analysis
-
max time kernel
116s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 01:17
Static task
static1
Behavioral task
behavioral1
Sample
798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe
Resource
win10v2004-20220901-en
General
-
Target
798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe
-
Size
1.1MB
-
MD5
099af7890c41187686be398fe0fb6798
-
SHA1
33fe044f72474daea6a8838c17fcf3bdf5b069b9
-
SHA256
798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd
-
SHA512
fe22212177b874ff09d1e2a53cac3ddf17927ae8acfab8d25ac045e4ca562112a614a3d21596c41d2d50913fa55600a82c1690bae1df895173083adcfa7dc9af
-
SSDEEP
24576:ark8EiW2vqy+XBbIRKlCx+JF42Ejs4vE5N4KNFwkj:ark8EiW2yylKlDujs4vWJNFwkj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 328 girl.exe -
Loads dropped DLL 1 IoCs
pid Process 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: 33 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe Token: SeIncBasePriorityPrivilege 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe Token: 33 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe Token: SeIncBasePriorityPrivilege 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe Token: 33 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe Token: SeIncBasePriorityPrivilege 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe Token: 33 328 girl.exe Token: SeIncBasePriorityPrivilege 328 girl.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 328 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe 27 PID 1368 wrote to memory of 328 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe 27 PID 1368 wrote to memory of 328 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe 27 PID 1368 wrote to memory of 328 1368 798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe"C:\Users\Admin\AppData\Local\Temp\798d72b65c53e0321bcb992ca1f2b8a75f8fb7d9305aa1d7d0daa487afaf28fd.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
\DEVICE\HARDDISKVOLUME2\Users\Admin\AppData\Local\Xenocode\Sandbox\Apache HTTP Server\2.2.14\2013.02.01T06.55\Virtual\STUBEXE\8.0.1112\@APPDATALOCAL@\Temp\girl.exe"C:\Users\Admin\AppData\Local\Temp\girl.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\Apache HTTP Server\2.2.14\2013.02.01T06.55\Virtual\STUBEXE\8.0.1112\@APPDATALOCAL@\Temp\girl.exe
Filesize17KB
MD596db81e75b033a2b58702055cb74cee1
SHA1ebd8cc59c5a30a3dfc617fa496610dd840fd87e8
SHA25623c053d93266369c3a7b90c135e09008ab2fa77665b15f3ce99e1773d2ea5dcf
SHA512b8e03934153e2f0bd08792298fa0b32ad1fb3bec77e8ab822839e468b3e5cc7c1fb73ec285f7504d7adbacdd6b80aa8484e021a9d30ae93561111226bbbe285f
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\Apache HTTP Server\2.2.14\2013.02.01T06.55\Virtual\STUBEXE\8.0.1112\@APPDATALOCAL@\Temp\girl.exe
Filesize17KB
MD596db81e75b033a2b58702055cb74cee1
SHA1ebd8cc59c5a30a3dfc617fa496610dd840fd87e8
SHA25623c053d93266369c3a7b90c135e09008ab2fa77665b15f3ce99e1773d2ea5dcf
SHA512b8e03934153e2f0bd08792298fa0b32ad1fb3bec77e8ab822839e468b3e5cc7c1fb73ec285f7504d7adbacdd6b80aa8484e021a9d30ae93561111226bbbe285f