Analysis
-
max time kernel
170s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe
Resource
win10v2004-20220812-en
General
-
Target
a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe
-
Size
993KB
-
MD5
c62fd2c527cf99a0bd9b5974adf6bce8
-
SHA1
3daf381c15b9c16211b33f505f866d244f1de7f7
-
SHA256
a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0
-
SHA512
3520af2c863b7427eb6ac54ff92c5eb374d2f14bb3019fccac0eb1cf8570f33cee7881ec341b0a6412b5676aa21a090bfa073c92d602f7655d01419c1d96c659
-
SSDEEP
24576:z4lavt0LkLL9IMixoEgeau1wYQrq9MmCS:Gkwkn9IMHeaumYWaPCS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1980 696.exe 1204 kuem.exe -
Loads dropped DLL 6 IoCs
pid Process 2032 a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe 2032 a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe 2032 a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe 2032 a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe 1980 696.exe 1980 696.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run kuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D366A2A4-4396-ACFF-8C53-348786E66251} = "C:\\Users\\Admin\\AppData\\Roaming\\Peef\\kuem.exe" kuem.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1980 set thread context of 1976 1980 696.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy 696.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 696.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\39B2030E-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe 1204 kuem.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeSecurityPrivilege 1980 696.exe Token: SeSecurityPrivilege 1980 696.exe Token: SeSecurityPrivilege 1980 696.exe Token: SeManageVolumePrivilege 1636 WinMail.exe Token: SeSecurityPrivilege 1976 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1636 WinMail.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1980 2032 a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe 28 PID 2032 wrote to memory of 1980 2032 a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe 28 PID 2032 wrote to memory of 1980 2032 a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe 28 PID 2032 wrote to memory of 1980 2032 a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe 28 PID 1980 wrote to memory of 1204 1980 696.exe 29 PID 1980 wrote to memory of 1204 1980 696.exe 29 PID 1980 wrote to memory of 1204 1980 696.exe 29 PID 1980 wrote to memory of 1204 1980 696.exe 29 PID 1204 wrote to memory of 1132 1204 kuem.exe 9 PID 1204 wrote to memory of 1132 1204 kuem.exe 9 PID 1204 wrote to memory of 1132 1204 kuem.exe 9 PID 1204 wrote to memory of 1132 1204 kuem.exe 9 PID 1204 wrote to memory of 1132 1204 kuem.exe 9 PID 1204 wrote to memory of 1236 1204 kuem.exe 17 PID 1204 wrote to memory of 1236 1204 kuem.exe 17 PID 1204 wrote to memory of 1236 1204 kuem.exe 17 PID 1204 wrote to memory of 1236 1204 kuem.exe 17 PID 1204 wrote to memory of 1236 1204 kuem.exe 17 PID 1204 wrote to memory of 1276 1204 kuem.exe 16 PID 1204 wrote to memory of 1276 1204 kuem.exe 16 PID 1204 wrote to memory of 1276 1204 kuem.exe 16 PID 1204 wrote to memory of 1276 1204 kuem.exe 16 PID 1204 wrote to memory of 1276 1204 kuem.exe 16 PID 1204 wrote to memory of 1980 1204 kuem.exe 28 PID 1204 wrote to memory of 1980 1204 kuem.exe 28 PID 1204 wrote to memory of 1980 1204 kuem.exe 28 PID 1204 wrote to memory of 1980 1204 kuem.exe 28 PID 1204 wrote to memory of 1980 1204 kuem.exe 28 PID 1204 wrote to memory of 1636 1204 kuem.exe 30 PID 1204 wrote to memory of 1636 1204 kuem.exe 30 PID 1204 wrote to memory of 1636 1204 kuem.exe 30 PID 1204 wrote to memory of 1636 1204 kuem.exe 30 PID 1204 wrote to memory of 1636 1204 kuem.exe 30 PID 1980 wrote to memory of 1976 1980 696.exe 31 PID 1980 wrote to memory of 1976 1980 696.exe 31 PID 1980 wrote to memory of 1976 1980 696.exe 31 PID 1980 wrote to memory of 1976 1980 696.exe 31 PID 1980 wrote to memory of 1976 1980 696.exe 31 PID 1980 wrote to memory of 1976 1980 696.exe 31 PID 1980 wrote to memory of 1976 1980 696.exe 31 PID 1980 wrote to memory of 1976 1980 696.exe 31 PID 1980 wrote to memory of 1976 1980 696.exe 31 PID 1204 wrote to memory of 852 1204 kuem.exe 32 PID 1204 wrote to memory of 852 1204 kuem.exe 32 PID 1204 wrote to memory of 852 1204 kuem.exe 32 PID 1204 wrote to memory of 852 1204 kuem.exe 32 PID 1204 wrote to memory of 852 1204 kuem.exe 32 PID 1204 wrote to memory of 1068 1204 kuem.exe 33 PID 1204 wrote to memory of 1068 1204 kuem.exe 33 PID 1204 wrote to memory of 1068 1204 kuem.exe 33 PID 1204 wrote to memory of 1068 1204 kuem.exe 33 PID 1204 wrote to memory of 1068 1204 kuem.exe 33 PID 1204 wrote to memory of 992 1204 kuem.exe 34 PID 1204 wrote to memory of 992 1204 kuem.exe 34 PID 1204 wrote to memory of 992 1204 kuem.exe 34 PID 1204 wrote to memory of 992 1204 kuem.exe 34 PID 1204 wrote to memory of 992 1204 kuem.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe"C:\Users\Admin\AppData\Local\Temp\a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\696\696.exe"C:\Users\Admin\AppData\Local\Temp\696\696.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\Peef\kuem.exe"C:\Users\Admin\AppData\Roaming\Peef\kuem.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1204
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa17e73ac.bat"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1236
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1636
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1267026280-1468471636542107054-200360568-605179609-1913564641755804401-319736228"1⤵PID:852
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1068
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5f771164a4981468ea1c7c1e3ed21b04a
SHA10fd9ffe6248e6a959293b3c9f98940c402b91423
SHA256f44ef395a7ac322848a3558748465fd8d3d26c15e8efcea5896de610a53237c4
SHA5121a0e6ce07d66624373cc49628b9a156466b83633950f61897fc4d02dcd71f78d780c1799f32bc879ffe0293ad6c21e7b1209d4243cd34eae7ec71fc7f43e8d08
-
Filesize
138KB
MD5f771164a4981468ea1c7c1e3ed21b04a
SHA10fd9ffe6248e6a959293b3c9f98940c402b91423
SHA256f44ef395a7ac322848a3558748465fd8d3d26c15e8efcea5896de610a53237c4
SHA5121a0e6ce07d66624373cc49628b9a156466b83633950f61897fc4d02dcd71f78d780c1799f32bc879ffe0293ad6c21e7b1209d4243cd34eae7ec71fc7f43e8d08
-
Filesize
193B
MD50d391993c957a23ccf2bc3826ecb22e6
SHA19a902c73c603f92b7bc0674593a3ad0bc34caa11
SHA2562338044a161d234f380175eeb8e3485be4e9e20eba3d165889b06c12da804cb2
SHA512cd3d8fcb36804d3f708bd76b29bae8eaf394c32ab8603cfe45b45ce53ee0b8aa7f3928fd2385e6974583a599957c2c4358dbf3154fd5b0b9804af293e29647ea
-
Filesize
341B
MD5a2ddc75a44306a5471d5c2a956c4fc63
SHA1fb3db40b5d589c2c1b19adb13d6f7e2a6fcb839f
SHA256a7dbc1fe0612c3c1dcb6036b13f0fac3fa43d1daa5ff14db83e5735261f0ce40
SHA512eab8df16316a3b5ad7782e9ec9796d6771c45fd47977bda135f297d01f688b2e044d93a36824d4d571f39041bde3c42478b104050877316905b3c5b9169b0cd5
-
Filesize
138KB
MD5d3b8ce4a606dd7266454c4b79c14752f
SHA1c72fb5791b296077cbc15a9fecc6f0504c712524
SHA256f767175e632539d7ff03ab5acdab6b06d1d57256254a5c3057290b4e1918dfe8
SHA512df196d38097f5719f77b51d50a0fcdb0ad9a7b8b28d1eb2dc578b354598c37ba29ad1c784a7c23063fea2860217e6fe1d2080e40a5ff5fe34a942ebc4abbb132
-
Filesize
138KB
MD5d3b8ce4a606dd7266454c4b79c14752f
SHA1c72fb5791b296077cbc15a9fecc6f0504c712524
SHA256f767175e632539d7ff03ab5acdab6b06d1d57256254a5c3057290b4e1918dfe8
SHA512df196d38097f5719f77b51d50a0fcdb0ad9a7b8b28d1eb2dc578b354598c37ba29ad1c784a7c23063fea2860217e6fe1d2080e40a5ff5fe34a942ebc4abbb132
-
Filesize
138KB
MD5f771164a4981468ea1c7c1e3ed21b04a
SHA10fd9ffe6248e6a959293b3c9f98940c402b91423
SHA256f44ef395a7ac322848a3558748465fd8d3d26c15e8efcea5896de610a53237c4
SHA5121a0e6ce07d66624373cc49628b9a156466b83633950f61897fc4d02dcd71f78d780c1799f32bc879ffe0293ad6c21e7b1209d4243cd34eae7ec71fc7f43e8d08
-
Filesize
138KB
MD5f771164a4981468ea1c7c1e3ed21b04a
SHA10fd9ffe6248e6a959293b3c9f98940c402b91423
SHA256f44ef395a7ac322848a3558748465fd8d3d26c15e8efcea5896de610a53237c4
SHA5121a0e6ce07d66624373cc49628b9a156466b83633950f61897fc4d02dcd71f78d780c1799f32bc879ffe0293ad6c21e7b1209d4243cd34eae7ec71fc7f43e8d08
-
Filesize
138KB
MD5f771164a4981468ea1c7c1e3ed21b04a
SHA10fd9ffe6248e6a959293b3c9f98940c402b91423
SHA256f44ef395a7ac322848a3558748465fd8d3d26c15e8efcea5896de610a53237c4
SHA5121a0e6ce07d66624373cc49628b9a156466b83633950f61897fc4d02dcd71f78d780c1799f32bc879ffe0293ad6c21e7b1209d4243cd34eae7ec71fc7f43e8d08
-
Filesize
138KB
MD5f771164a4981468ea1c7c1e3ed21b04a
SHA10fd9ffe6248e6a959293b3c9f98940c402b91423
SHA256f44ef395a7ac322848a3558748465fd8d3d26c15e8efcea5896de610a53237c4
SHA5121a0e6ce07d66624373cc49628b9a156466b83633950f61897fc4d02dcd71f78d780c1799f32bc879ffe0293ad6c21e7b1209d4243cd34eae7ec71fc7f43e8d08
-
Filesize
138KB
MD5d3b8ce4a606dd7266454c4b79c14752f
SHA1c72fb5791b296077cbc15a9fecc6f0504c712524
SHA256f767175e632539d7ff03ab5acdab6b06d1d57256254a5c3057290b4e1918dfe8
SHA512df196d38097f5719f77b51d50a0fcdb0ad9a7b8b28d1eb2dc578b354598c37ba29ad1c784a7c23063fea2860217e6fe1d2080e40a5ff5fe34a942ebc4abbb132
-
Filesize
138KB
MD5d3b8ce4a606dd7266454c4b79c14752f
SHA1c72fb5791b296077cbc15a9fecc6f0504c712524
SHA256f767175e632539d7ff03ab5acdab6b06d1d57256254a5c3057290b4e1918dfe8
SHA512df196d38097f5719f77b51d50a0fcdb0ad9a7b8b28d1eb2dc578b354598c37ba29ad1c784a7c23063fea2860217e6fe1d2080e40a5ff5fe34a942ebc4abbb132