Analysis
-
max time kernel
36s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 09:26
Static task
static1
Behavioral task
behavioral1
Sample
f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe
Resource
win10v2004-20220812-en
General
-
Target
f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe
-
Size
107KB
-
MD5
0c41f02a23cc81c2b009d7770ebf9941
-
SHA1
584a016eed90cc94bc47fb54cc85caff8bf6b70a
-
SHA256
f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c
-
SHA512
e03d193211e44570b168f8641a5968e508fff02575556e35078500e67995d025d4bb369226b893504684b00212ba61ad1e15b174c804bb528b9ff33166acd8e6
-
SSDEEP
3072:iiDfmqcCuCPmjlkRFYocPVdHfQn0Ycs7yq:HDuqcIPm5kRgNdH40Yccyq
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1644-55-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1644-57-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1644-58-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1644-63-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1644-64-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1644-65-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1644-67-0x0000000000400000-0x0000000000478000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VideoDrivers = "C:\\Windows\\system32\\winldsr.exe" f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\winldsr.exe f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe File opened for modification C:\Windows\SysWOW64\winldsr.exe f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1672 set thread context of 1644 1672 f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1644 1672 f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe 27 PID 1672 wrote to memory of 1644 1672 f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe 27 PID 1672 wrote to memory of 1644 1672 f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe 27 PID 1672 wrote to memory of 1644 1672 f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe 27 PID 1672 wrote to memory of 1644 1672 f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe 27 PID 1672 wrote to memory of 1644 1672 f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe 27 PID 1672 wrote to memory of 1644 1672 f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe 27 PID 1672 wrote to memory of 1644 1672 f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe"C:\Users\Admin\AppData\Local\Temp\f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe"C:\Users\Admin\AppData\Local\Temp\f3a7996d7f0212d50516511e771e56d6205b8d25b038220eace34f31ef65ed0c.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:1644
-