Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
8 signatures
150 seconds
General
-
Target
Trojan-Ransom.Win32.Blocker.exe
-
Size
4.3MB
-
MD5
f20398f054b01176d840c50cd1da50e8
-
SHA1
5799bbed633e61616af765a4016d3c5d254c43f8
-
SHA256
f8ea29e5d290c4fc61d6c1a628ddcdfcd020e3279894005f9c2e5f3ac0440d2f
-
SHA512
f59580fd802543b27a768f607c051aa9adf2563c741ab6e1303ca0b917a4c438811fd25a381dcf11c1800dc617a1dffa155a2e4ae0df94cad2154abe22dbdd0a
-
SSDEEP
98304:vfMOM+OKvL2ZOaHqe6ioUeQZk/FEXf9VX6Bkwlnx+6cB:vEjKDre6iZq/2lBePC6c
Score
10/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\placax.sys Trojan-Ransom.Win32.Blocker.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\placax\ImagePath = "system32\\drivers\\placax.sys" Trojan-Ransom.Win32.Blocker.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\impressorax\ImagePath = "system32\\drivers\\impressorax.sys" Trojan-Ransom.Win32.Blocker.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Trojan-Ransom.Win32.Blocker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\ctfmor.exe" Trojan-Ransom.Win32.Blocker.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1520 892 WerFault.exe 15 -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 460 Process not Found 460 Process not Found -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 892 wrote to memory of 1520 892 Trojan-Ransom.Win32.Blocker.exe 27 PID 892 wrote to memory of 1520 892 Trojan-Ransom.Win32.Blocker.exe 27 PID 892 wrote to memory of 1520 892 Trojan-Ransom.Win32.Blocker.exe 27 PID 892 wrote to memory of 1520 892 Trojan-Ransom.Win32.Blocker.exe 27 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Trojan-Ransom.Win32.Blocker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"1⤵
- UAC bypass
- Drops file in Drivers directory
- Sets service image path in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- System policy modification
PID:892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 5722⤵
- Program crash
PID:1520
-