Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe
Resource
win10-20220812-en
General
-
Target
f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe
-
Size
5.8MB
-
MD5
cc65b782891a1607c75a02a45482a4de
-
SHA1
e3e7083777d011b630efc2fcec2c1b159ec0f6f3
-
SHA256
f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0
-
SHA512
cea23129a8eca0a43b557196b2c0a9f39453658174d7e9badce6997222f58d031e23a4163766de95a171f8fe0c8d71716d4b9941481167a1acd9954330571b39
-
SSDEEP
98304:v/LU6G3sLQ2LCX4fGc2glR3jIgJqHrk9ZO0QG6aoNW3ZTWDtNy08I+KW2:vDOIfzNjIgsHrX0Z6tkpC+08ILW2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1608 IntelGAS-Ver4.8.8.8.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 628 icacls.exe 2028 icacls.exe 1692 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1520 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 1608 IntelGAS-Ver4.8.8.8.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1520 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 27 PID 1212 wrote to memory of 1520 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 27 PID 1212 wrote to memory of 1520 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 27 PID 1212 wrote to memory of 1520 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 27 PID 1212 wrote to memory of 628 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 29 PID 1212 wrote to memory of 628 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 29 PID 1212 wrote to memory of 628 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 29 PID 1212 wrote to memory of 628 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 29 PID 1212 wrote to memory of 2028 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 31 PID 1212 wrote to memory of 2028 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 31 PID 1212 wrote to memory of 2028 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 31 PID 1212 wrote to memory of 2028 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 31 PID 1212 wrote to memory of 1692 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 33 PID 1212 wrote to memory of 1692 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 33 PID 1212 wrote to memory of 1692 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 33 PID 1212 wrote to memory of 1692 1212 f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe 33 PID 568 wrote to memory of 1608 568 taskeng.exe 36 PID 568 wrote to memory of 1608 568 taskeng.exe 36 PID 568 wrote to memory of 1608 568 taskeng.exe 36 PID 568 wrote to memory of 1608 568 taskeng.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe"C:\Users\Admin\AppData\Local\Temp\f2d24ff7b7ed9641453cac5b4a0d97591e7c5c9ec7aafcead9f14bc9d0b461a0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "Windows\IntelComputingToolkit\IntelGAS4.8.8.8." /TR "C:\ProgramData\InteIToolSkits\IntelGAS-Ver4.8.8.8.exe" /SC MINUTE2⤵
- Creates scheduled task(s)
PID:1520
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\InteIToolSkits" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:628
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\InteIToolSkits" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:2028
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\InteIToolSkits" /inheritance:e /deny "adMnepoxyFEYWGOLmin:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:1692
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FB2D0CC0-54C5-4E3A-B765-1B5BC438F269} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\ProgramData\InteIToolSkits\IntelGAS-Ver4.8.8.8.exeC:\ProgramData\InteIToolSkits\IntelGAS-Ver4.8.8.8.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1015.2MB
MD589d8fe27b81fb9ec734360152003af53
SHA1b407e26d213e5b46e7291ca61d9e5d5fa73c7f4f
SHA2565dc52dc90707ee6f08bb98f4b4566f20a5565a4bfb1d12ab059ae8db7dda3a6f
SHA5127fbfd6e8519b4375975403c6fd76f88993702f8eff81d6508235474fdfdaccbb552ba4bbab7fd6bd67bcded0d3234d541731333d61bcd7490c480865f6aa22ca
-
Filesize
1015.2MB
MD589d8fe27b81fb9ec734360152003af53
SHA1b407e26d213e5b46e7291ca61d9e5d5fa73c7f4f
SHA2565dc52dc90707ee6f08bb98f4b4566f20a5565a4bfb1d12ab059ae8db7dda3a6f
SHA5127fbfd6e8519b4375975403c6fd76f88993702f8eff81d6508235474fdfdaccbb552ba4bbab7fd6bd67bcded0d3234d541731333d61bcd7490c480865f6aa22ca