Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 14:16
Static task
static1
Behavioral task
behavioral1
Sample
116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe
Resource
win7-20220812-en
General
-
Target
116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe
-
Size
31KB
-
MD5
05040dfe39ea468ef525df6c52c58e80
-
SHA1
f5dc32557c5c45e6bd66fb18d57e164f968908dc
-
SHA256
116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7
-
SHA512
2c8d1db55689eb0e63dcc6c9d4e75df26644607bb5029d123afdbfb48ec1d34cc21ad40fcd43a52540fbff033f5e5037ea328a7025dff981ebd0880e4152b362
-
SSDEEP
768:tqku0P5K8KZLnR3JQCxNiwDaVQr1rDnpIOw3VzaM9o:tqku0P5zqTzrx0wGVQr1/Pwlz
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1464 cmd.exe -
Drops file in System32 directory 5 IoCs
Processes:
116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exedescription ioc process File created C:\Windows\SysWOW64\sxload.tmp 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe File created C:\Windows\System32\123F5B6.tmp 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe File opened for modification C:\Windows\SysWOW64\123F5B6.tmp 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe File created C:\Windows\System32\123F902.tmp 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe File opened for modification C:\Windows\SysWOW64\123F902.tmp 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe -
Drops file in Program Files directory 1 IoCs
Processes:
116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exedescription ioc process File created C:\Program Files (x86)\Common Files\sxlzg.tmp 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 1328 taskkill.exe 1268 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe Token: SeDebugPrivilege 1328 taskkill.exe Token: SeDebugPrivilege 1268 taskkill.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exepid process 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exedescription pid process target process PID 1632 wrote to memory of 1328 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe taskkill.exe PID 1632 wrote to memory of 1328 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe taskkill.exe PID 1632 wrote to memory of 1328 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe taskkill.exe PID 1632 wrote to memory of 1328 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe taskkill.exe PID 1632 wrote to memory of 1268 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe taskkill.exe PID 1632 wrote to memory of 1268 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe taskkill.exe PID 1632 wrote to memory of 1268 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe taskkill.exe PID 1632 wrote to memory of 1268 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe taskkill.exe PID 1632 wrote to memory of 1464 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe cmd.exe PID 1632 wrote to memory of 1464 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe cmd.exe PID 1632 wrote to memory of 1464 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe cmd.exe PID 1632 wrote to memory of 1464 1632 116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe"C:\Users\Admin\AppData\Local\Temp\116a97b9f284905d011919d518f263d89550c257928044bda038f62f3965c2a7.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "DragonNest.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "sdologin.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\SysWOW64\cmd.execmd /c 1.bat2⤵
- Deletes itself
PID:1464
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251B
MD5195e41626b00cdde54fc9b9eb8f02e49
SHA1ea99a6ea3a1ddf5e3519fb7f020351462d26121a
SHA256b555da6bfba1be58b55b8a2ee413f27a51b829bae7efbe43ab06b3322fc00e72
SHA5121acdce028dc6a5f8eecfd4925992b18b7a5080f54480160b153c48fe5633c440db3f44e23813b7786c40072556110189f2550940f4d2ec35bd917254e7092f91