Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
20-11-2022 03:43
Static task
static1
Behavioral task
behavioral1
Sample
8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe
Resource
win10v2004-20221111-en
General
-
Target
8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe
-
Size
201KB
-
MD5
004552c78c12616e07ed593729038c0d
-
SHA1
b2dce0331b16c0bbadb11322fd7f135cb0c68400
-
SHA256
8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9
-
SHA512
430933a40e02fe9ed081a645575b291efe9b4f9d8d08c142c39e62db88a1d2feb9978e72b85781c26e1987f19a21250001fa85026619619d85acac9b390811d4
-
SSDEEP
6144:Hza2Nj+MLxwkcWTq/81DDiSTz9nqEja3TXU0xtFa:HqEjk7l7Fa
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 544 security.exe 548 security.exe -
resource yara_rule behavioral1/memory/1876-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1876-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1876-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1876-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1876-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1876-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1876-108-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/548-110-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/548-112-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Security = "C:\\Users\\Admin\\AppData\\Roaming\\Security\\security.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2012 set thread context of 1876 2012 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 28 PID 544 set thread context of 548 544 security.exe 33 PID 544 set thread context of 1828 544 security.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe Token: SeDebugPrivilege 548 security.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2012 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 544 security.exe 548 security.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1876 2012 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 28 PID 2012 wrote to memory of 1876 2012 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 28 PID 2012 wrote to memory of 1876 2012 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 28 PID 2012 wrote to memory of 1876 2012 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 28 PID 2012 wrote to memory of 1876 2012 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 28 PID 2012 wrote to memory of 1876 2012 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 28 PID 2012 wrote to memory of 1876 2012 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 28 PID 2012 wrote to memory of 1876 2012 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 28 PID 1876 wrote to memory of 936 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 29 PID 1876 wrote to memory of 936 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 29 PID 1876 wrote to memory of 936 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 29 PID 1876 wrote to memory of 936 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 29 PID 936 wrote to memory of 1180 936 cmd.exe 31 PID 936 wrote to memory of 1180 936 cmd.exe 31 PID 936 wrote to memory of 1180 936 cmd.exe 31 PID 936 wrote to memory of 1180 936 cmd.exe 31 PID 1876 wrote to memory of 544 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 32 PID 1876 wrote to memory of 544 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 32 PID 1876 wrote to memory of 544 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 32 PID 1876 wrote to memory of 544 1876 8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe 32 PID 544 wrote to memory of 548 544 security.exe 33 PID 544 wrote to memory of 548 544 security.exe 33 PID 544 wrote to memory of 548 544 security.exe 33 PID 544 wrote to memory of 548 544 security.exe 33 PID 544 wrote to memory of 548 544 security.exe 33 PID 544 wrote to memory of 548 544 security.exe 33 PID 544 wrote to memory of 548 544 security.exe 33 PID 544 wrote to memory of 548 544 security.exe 33 PID 544 wrote to memory of 1828 544 security.exe 34 PID 544 wrote to memory of 1828 544 security.exe 34 PID 544 wrote to memory of 1828 544 security.exe 34 PID 544 wrote to memory of 1828 544 security.exe 34 PID 544 wrote to memory of 1828 544 security.exe 34 PID 544 wrote to memory of 1828 544 security.exe 34 PID 544 wrote to memory of 1828 544 security.exe 34 PID 544 wrote to memory of 1828 544 security.exe 34 PID 544 wrote to memory of 1828 544 security.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe"C:\Users\Admin\AppData\Local\Temp\8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe"C:\Users\Admin\AppData\Local\Temp\8751c9c2b10285b625eb2cfed9592dd3ed19e57bc1c818c43d40d5f0f1d96ec9.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HKWAX.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Security" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Security\security.exe" /f4⤵
- Adds Run key to start application
PID:1180
-
-
-
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:548
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵PID:1828
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD56f473a1ba53e043362047f72e20b34f4
SHA1e8f121a589e1207ed950453376ee1d21b1223835
SHA2565fbce2c77a90ba9edbcf60be3851ab81633b7c10b1babb624d475c7be589de4b
SHA512b4976d40bc708ae6cddf367a5382cd532e4cf235b848cdaa4e4d317e06d9126e50745a7772591bc21dc7380689f4399e57501b0aa73cd231bce32e22d53b0818
-
Filesize
201KB
MD58442ad350b4c8b1a5acd8e0e32b67d95
SHA156d375aecd1a4e290e7b2406e4b9680e696c3ef7
SHA256821760516d405e023890f49280445e8480bbe6bd30e0c1ddb39a499afce7c86b
SHA512ea66751005bd3a5f371e338704e96747a442aa0f1b3665d1de2bd78414620cd8007976d77360194bcf2e28944c6a445a380bb317362f1e29248df30537f5d0a4
-
Filesize
201KB
MD58442ad350b4c8b1a5acd8e0e32b67d95
SHA156d375aecd1a4e290e7b2406e4b9680e696c3ef7
SHA256821760516d405e023890f49280445e8480bbe6bd30e0c1ddb39a499afce7c86b
SHA512ea66751005bd3a5f371e338704e96747a442aa0f1b3665d1de2bd78414620cd8007976d77360194bcf2e28944c6a445a380bb317362f1e29248df30537f5d0a4
-
Filesize
201KB
MD58442ad350b4c8b1a5acd8e0e32b67d95
SHA156d375aecd1a4e290e7b2406e4b9680e696c3ef7
SHA256821760516d405e023890f49280445e8480bbe6bd30e0c1ddb39a499afce7c86b
SHA512ea66751005bd3a5f371e338704e96747a442aa0f1b3665d1de2bd78414620cd8007976d77360194bcf2e28944c6a445a380bb317362f1e29248df30537f5d0a4
-
Filesize
201KB
MD58442ad350b4c8b1a5acd8e0e32b67d95
SHA156d375aecd1a4e290e7b2406e4b9680e696c3ef7
SHA256821760516d405e023890f49280445e8480bbe6bd30e0c1ddb39a499afce7c86b
SHA512ea66751005bd3a5f371e338704e96747a442aa0f1b3665d1de2bd78414620cd8007976d77360194bcf2e28944c6a445a380bb317362f1e29248df30537f5d0a4
-
Filesize
201KB
MD58442ad350b4c8b1a5acd8e0e32b67d95
SHA156d375aecd1a4e290e7b2406e4b9680e696c3ef7
SHA256821760516d405e023890f49280445e8480bbe6bd30e0c1ddb39a499afce7c86b
SHA512ea66751005bd3a5f371e338704e96747a442aa0f1b3665d1de2bd78414620cd8007976d77360194bcf2e28944c6a445a380bb317362f1e29248df30537f5d0a4
-
Filesize
201KB
MD58442ad350b4c8b1a5acd8e0e32b67d95
SHA156d375aecd1a4e290e7b2406e4b9680e696c3ef7
SHA256821760516d405e023890f49280445e8480bbe6bd30e0c1ddb39a499afce7c86b
SHA512ea66751005bd3a5f371e338704e96747a442aa0f1b3665d1de2bd78414620cd8007976d77360194bcf2e28944c6a445a380bb317362f1e29248df30537f5d0a4
-
Filesize
201KB
MD58442ad350b4c8b1a5acd8e0e32b67d95
SHA156d375aecd1a4e290e7b2406e4b9680e696c3ef7
SHA256821760516d405e023890f49280445e8480bbe6bd30e0c1ddb39a499afce7c86b
SHA512ea66751005bd3a5f371e338704e96747a442aa0f1b3665d1de2bd78414620cd8007976d77360194bcf2e28944c6a445a380bb317362f1e29248df30537f5d0a4
-
Filesize
201KB
MD58442ad350b4c8b1a5acd8e0e32b67d95
SHA156d375aecd1a4e290e7b2406e4b9680e696c3ef7
SHA256821760516d405e023890f49280445e8480bbe6bd30e0c1ddb39a499afce7c86b
SHA512ea66751005bd3a5f371e338704e96747a442aa0f1b3665d1de2bd78414620cd8007976d77360194bcf2e28944c6a445a380bb317362f1e29248df30537f5d0a4