Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 08:01
Static task
static1
Behavioral task
behavioral1
Sample
ab9e1dedc5259eb033ea61d175d264d048f95fb11ca83aa1b90a576dc7944c0a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab9e1dedc5259eb033ea61d175d264d048f95fb11ca83aa1b90a576dc7944c0a.exe
Resource
win10v2004-20220812-en
General
-
Target
ab9e1dedc5259eb033ea61d175d264d048f95fb11ca83aa1b90a576dc7944c0a.exe
-
Size
329KB
-
MD5
2a41d3cac767f87fe2189aefc68e446e
-
SHA1
3d29f2242a45dfa23356ec67cb82446ba46a3a94
-
SHA256
ab9e1dedc5259eb033ea61d175d264d048f95fb11ca83aa1b90a576dc7944c0a
-
SHA512
cd758fd283f6d0ae59eab988746e0466284f846c76889acee7907d859eb9f1b0abc32a08d59ecae664aaad911c7e8141d713e4c4ad9671fe29404bbc62f7ecb2
-
SSDEEP
6144:oFSJry9l99YeXc6ChVFvfdXpO8swhfLATHCYm+AKthZnysqDnVNRPwoxYrYBei6t:nY9l9Sxb9fd5O8JxL46+AaDysatwoxYn
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 756 ab9e1dedc5259eb033ea61d175d264d048f95fb11ca83aa1b90a576dc7944c0a.exe 756 ab9e1dedc5259eb033ea61d175d264d048f95fb11ca83aa1b90a576dc7944c0a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main ab9e1dedc5259eb033ea61d175d264d048f95fb11ca83aa1b90a576dc7944c0a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 756 ab9e1dedc5259eb033ea61d175d264d048f95fb11ca83aa1b90a576dc7944c0a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 756 ab9e1dedc5259eb033ea61d175d264d048f95fb11ca83aa1b90a576dc7944c0a.exe 756 ab9e1dedc5259eb033ea61d175d264d048f95fb11ca83aa1b90a576dc7944c0a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab9e1dedc5259eb033ea61d175d264d048f95fb11ca83aa1b90a576dc7944c0a.exe"C:\Users\Admin\AppData\Local\Temp\ab9e1dedc5259eb033ea61d175d264d048f95fb11ca83aa1b90a576dc7944c0a.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
496KB
MD5101253c625eb493e8370d2620e915146
SHA1263b79d7e28fbc52223ef817aea7f8b9a060e73c
SHA2569bab4695daa00369eb8023a872dc1cfbfc25af0ebb2607149e494ef94b332788
SHA512d1d479545c894c3565df740198a7e31866c0bb563c42a5b040c5670483ee5c18fffcc437643a1a79901bb1c2f255d009f27bae7d944b5e5366b59217db95bb7b
-
Filesize
496KB
MD5101253c625eb493e8370d2620e915146
SHA1263b79d7e28fbc52223ef817aea7f8b9a060e73c
SHA2569bab4695daa00369eb8023a872dc1cfbfc25af0ebb2607149e494ef94b332788
SHA512d1d479545c894c3565df740198a7e31866c0bb563c42a5b040c5670483ee5c18fffcc437643a1a79901bb1c2f255d009f27bae7d944b5e5366b59217db95bb7b