Overview
overview
10Static
static
416/0e055e...59.exe
windows7-x64
1416/0e055e...59.exe
windows10-2004-x64
1416/1192e5...71.exe
windows7-x64
5416/1192e5...71.exe
windows10-2004-x64
5416/442068...71.exe
windows7-x64
10416/442068...71.exe
windows10-2004-x64
10416/444471...1e.exe
windows7-x64
1416/444471...1e.exe
windows10-2004-x64
1416/57b3e3...ad.exe
windows7-x64
6416/57b3e3...ad.exe
windows10-2004-x64
6416/83111a...a8.exe
windows7-x64
1416/83111a...a8.exe
windows10-2004-x64
1416/9fb365...0d.exe
windows7-x64
3416/9fb365...0d.exe
windows10-2004-x64
3416/b0118d...94.exe
windows7-x64
1416/b0118d...94.exe
windows10-2004-x64
1416/c30afd...35.exe
windows7-x64
3416/c30afd...35.exe
windows10-2004-x64
3416/d7175f...6d.exe
windows7-x64
1416/d7175f...6d.exe
windows10-2004-x64
1416/e8b275...bb.exe
windows7-x64
3416/e8b275...bb.exe
windows10-2004-x64
3416/ed8b3b...0a.exe
windows7-x64
1416/ed8b3b...0a.exe
windows10-2004-x64
1Analysis
-
max time kernel
132s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-11-2022 03:33
Static task
static1
Behavioral task
behavioral1
Sample
416/0e055e38861331920a9f5caec8cb9c1fa5d693e4c710d9bca7ff09df42026359.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
416/0e055e38861331920a9f5caec8cb9c1fa5d693e4c710d9bca7ff09df42026359.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
416/1192e513c036fa5b640ccf1796790b03341fa50e6b20254e75f534d35e846a71.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
416/1192e513c036fa5b640ccf1796790b03341fa50e6b20254e75f534d35e846a71.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
416/442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
416/442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
416/444471a678be35837f0e4d1930a2187345a29b538a8b496cf071a810bfc85b1e.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
416/444471a678be35837f0e4d1930a2187345a29b538a8b496cf071a810bfc85b1e.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
416/57b3e371843add6e8c0c6c146deec48661318c5326514570e7bad0b948f196ad.exe
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
416/57b3e371843add6e8c0c6c146deec48661318c5326514570e7bad0b948f196ad.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
416/83111ab2f5139678b7db4a8ba74302e75442ac3367a78a4872cf0481b125cfa8.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
416/83111ab2f5139678b7db4a8ba74302e75442ac3367a78a4872cf0481b125cfa8.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
416/9fb365eaecb9b0859c75c7ee4fc8d6affa9d1d5ded2bb2453fffd9723f3d260d.exe
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
416/9fb365eaecb9b0859c75c7ee4fc8d6affa9d1d5ded2bb2453fffd9723f3d260d.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
416/b0118d9d3be0bf1d5536dc98e1d2567dfbd60e5fde92b68591f8d595ea8fcd94.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
416/b0118d9d3be0bf1d5536dc98e1d2567dfbd60e5fde92b68591f8d595ea8fcd94.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
416/c30afd55859ca602b97e7708d0dbbf14f581256c352289ca88433bacd5da6335.exe
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
416/c30afd55859ca602b97e7708d0dbbf14f581256c352289ca88433bacd5da6335.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
416/d7175fc8f8d2c38619a6335a5f8c83de00108016aa80c8d34246be3d7afb8d6d.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
416/d7175fc8f8d2c38619a6335a5f8c83de00108016aa80c8d34246be3d7afb8d6d.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
416/e8b2756b2b62303253e51178f5a9f97657ee08cc0c879889b61dd960da4627bb.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
416/e8b2756b2b62303253e51178f5a9f97657ee08cc0c879889b61dd960da4627bb.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
416/ed8b3bd9953e58889521bbd62786a3f3b9d410b3a7f520847a422647591ccf0a.exe
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
416/ed8b3bd9953e58889521bbd62786a3f3b9d410b3a7f520847a422647591ccf0a.exe
Resource
win10v2004-20220901-en
General
-
Target
416/442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe
-
Size
4.9MB
-
MD5
219bb798c25ca37572626da432a34c7f
-
SHA1
57ec641c709495090ddc9c4fb32edd2a067260e8
-
SHA256
442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571
-
SHA512
95ade4c8d7f18514a786f2d17d9499f6f2b1b9289fd77efd77eceaa6275bf8197b5461d91434612031ce8d80e7c5a9eaacccee1262d022720e6ce34483ecfdc5
-
SSDEEP
49152:Kkriz5EgVfFuVx3J4feF48vdtgjUiNaWuwfGi4gblMejACsKa43wVrMVnd7btHf:KmMEg9nf+tltBWahdCjvD3wVraX
Malware Config
Extracted
raccoon
517bb0d640c1242c3f069aab3d1018d6
http://51.195.166.178/
http://5.252.177.22
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exedescription pid process target process PID 1504 set thread context of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1112 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exepowershell.exedescription pid process Token: SeDebugPrivilege 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe Token: SeDebugPrivilege 1112 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exedescription pid process target process PID 1504 wrote to memory of 1112 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe powershell.exe PID 1504 wrote to memory of 1112 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe powershell.exe PID 1504 wrote to memory of 1112 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe powershell.exe PID 1504 wrote to memory of 1112 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe powershell.exe PID 1504 wrote to memory of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe PID 1504 wrote to memory of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe PID 1504 wrote to memory of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe PID 1504 wrote to memory of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe PID 1504 wrote to memory of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe PID 1504 wrote to memory of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe PID 1504 wrote to memory of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe PID 1504 wrote to memory of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe PID 1504 wrote to memory of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe PID 1504 wrote to memory of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe PID 1504 wrote to memory of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe PID 1504 wrote to memory of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe PID 1504 wrote to memory of 948 1504 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe 442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe"C:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exeC:\Users\Admin\AppData\Local\Temp\416\442068674b35f29fc923668486ef6dd33964f878f421a8216b973eb6a869f571.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/948-72-0x0000000000408597-mapping.dmp
-
memory/948-74-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/948-63-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/948-76-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/948-66-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/948-68-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/948-69-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/948-64-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/948-71-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1112-60-0x000000006EC80000-0x000000006F22B000-memory.dmpFilesize
5.7MB
-
memory/1112-62-0x000000006EC80000-0x000000006F22B000-memory.dmpFilesize
5.7MB
-
memory/1112-58-0x0000000000000000-mapping.dmp
-
memory/1112-61-0x000000006EC80000-0x000000006F22B000-memory.dmpFilesize
5.7MB
-
memory/1504-54-0x0000000001200000-0x00000000016E8000-memory.dmpFilesize
4.9MB
-
memory/1504-56-0x00000000768A1000-0x00000000768A3000-memory.dmpFilesize
8KB
-
memory/1504-55-0x0000000000B80000-0x0000000000C62000-memory.dmpFilesize
904KB
-
memory/1504-57-0x0000000004F10000-0x0000000004FA2000-memory.dmpFilesize
584KB