Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 20:12
Behavioral task
behavioral1
Sample
d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe
Resource
win10v2004-20220812-en
General
-
Target
d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe
-
Size
367KB
-
MD5
0b71cb4d6923af780752af6bd33855a1
-
SHA1
8e326f020ee113e91d051f12162dc0ae11c5fcc6
-
SHA256
d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06
-
SHA512
8c90b73a21e7d6bb60d1aef72e5bcb813b83b8b22f1aabb5f8a35b80ba394ea0729464680b1762bbab83d26dc2221bcf92bb88b0c3d12f0bb5ef72dcf6c59a78
-
SSDEEP
6144:eafRhEqNEZNR5iOjSNAQ4Q+jO1PCLmQ1p3iWEKFAMk0QY/GDQoyazscUdEsC5wyj:ffRhEqENM3NTeLP38K1kzY+DQoyazsf2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 628 Server.exe -
resource yara_rule behavioral1/memory/1940-61-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1940 d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 628 Server.exe 628 Server.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: 33 1940 d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe Token: SeIncBasePriorityPrivilege 1940 d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe Token: 33 1940 d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe Token: SeIncBasePriorityPrivilege 1940 d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe Token: 33 1940 d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe Token: SeIncBasePriorityPrivilege 1940 d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe Token: 33 628 Server.exe Token: SeIncBasePriorityPrivilege 628 Server.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1940 wrote to memory of 628 1940 d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe 27 PID 1940 wrote to memory of 628 1940 d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe 27 PID 1940 wrote to memory of 628 1940 d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe 27 PID 1940 wrote to memory of 628 1940 d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe 27 PID 628 wrote to memory of 1284 628 Server.exe 16 PID 628 wrote to memory of 1284 628 Server.exe 16 PID 628 wrote to memory of 1284 628 Server.exe 16 PID 628 wrote to memory of 1284 628 Server.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe"C:\Users\Admin\AppData\Local\Temp\d17d8cb7fd5fe7b2bd4d1be4ec30208f20e159848ea8b0a3d8d104a247ee1f06.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
\DEVICE\HARDDISKVOLUME2\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2011.04.26T20.48\Virtual\STUBEXE\8.0.1112\@APPDATALOCAL@\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2011.04.26T20.48\Virtual\STUBEXE\8.0.1112\@APPDATALOCAL@\Temp\Server.exe
Filesize17KB
MD5e6361c7005b104dfa196e7bba3026a61
SHA1645820b4f900b28b488e0de12df4e3e45aae55bc
SHA2565015077f26651c8186111e79eac3abe04de303aa83e6b6c03526ec0e62c46a8d
SHA512193a4410b729a1d0ac73cdcd5f20f68c6b86be079e3764d4671907f42870dbf0dae6707c0798324302cec972cb22f5f7c7692e57ac623141387839a6a2f82c8c
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2011.04.26T20.48\Virtual\STUBEXE\8.0.1112\@APPDATALOCAL@\Temp\Server.exe
Filesize17KB
MD5e6361c7005b104dfa196e7bba3026a61
SHA1645820b4f900b28b488e0de12df4e3e45aae55bc
SHA2565015077f26651c8186111e79eac3abe04de303aa83e6b6c03526ec0e62c46a8d
SHA512193a4410b729a1d0ac73cdcd5f20f68c6b86be079e3764d4671907f42870dbf0dae6707c0798324302cec972cb22f5f7c7692e57ac623141387839a6a2f82c8c