Analysis
-
max time kernel
54s -
max time network
57s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 10:05
Behavioral task
behavioral1
Sample
46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe
Resource
win7-20221111-en
General
-
Target
46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe
-
Size
583KB
-
MD5
31ae99a368bf4296748f8efa25513d80
-
SHA1
002daa8b2f65b30711d5db8b6abbfaf1a0fc9b00
-
SHA256
46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7
-
SHA512
0a3b1e9cd7a2d3f76890842ce0336d8683ae51f6e0a7d92187470addc580a12dd839548c7bf8f8d626a11695017804f42bd87b1c8a1231ff754c10bc524fd2f5
-
SSDEEP
12288:ZgCYxPVQ1KRLLIyDASbumfbKFsdrojwSzunLEjzaQ/K1V+qr:ZgCYQ1LGum4sx8Kofd/uV+w
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000a0000000133e5-55.dat aspack_v212_v242 behavioral1/files/0x000a0000000133e5-56.dat aspack_v212_v242 behavioral1/files/0x000a0000000133e5-58.dat aspack_v212_v242 behavioral1/files/0x000a0000000133e5-60.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1812 LXfWcN.exe -
resource yara_rule behavioral1/memory/1388-61-0x0000000000400000-0x0000000000586000-memory.dmp upx behavioral1/memory/1388-65-0x0000000000400000-0x0000000000586000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1388 46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe 1388 46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe LXfWcN.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe LXfWcN.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe LXfWcN.exe File opened for modification C:\Program Files\Windows Mail\wab.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE LXfWcN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe LXfWcN.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe LXfWcN.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE LXfWcN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE LXfWcN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE LXfWcN.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe LXfWcN.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{E99C3EBC-29AE-41F5-B21B-30DFBE45C88A}\chrome_installer.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE LXfWcN.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe LXfWcN.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe LXfWcN.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe LXfWcN.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe LXfWcN.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe LXfWcN.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler64.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE LXfWcN.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateSetup.exe LXfWcN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1388 46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1812 1388 46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe 28 PID 1388 wrote to memory of 1812 1388 46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe 28 PID 1388 wrote to memory of 1812 1388 46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe 28 PID 1388 wrote to memory of 1812 1388 46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe 28 PID 1812 wrote to memory of 960 1812 LXfWcN.exe 31 PID 1812 wrote to memory of 960 1812 LXfWcN.exe 31 PID 1812 wrote to memory of 960 1812 LXfWcN.exe 31 PID 1812 wrote to memory of 960 1812 LXfWcN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe"C:\Users\Admin\AppData\Local\Temp\46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\LXfWcN.exeC:\Users\Admin\AppData\Local\Temp\LXfWcN.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5fed24bc.bat" "3⤵PID:960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD511ce73a66cb254576110989dc705cbc7
SHA1421f0e75d3ba47ab7e1c65543370220f1a4155e2
SHA256719bb143460623377474e562712ee5b1ec41acb2ab4f3ebdf532477ba9d6a14e
SHA512c14bed1d858d9490f87916a43b0051547b3e9e8203973e22e37c7df456772dacb73c1ba82664e94745835d32e706d5e0c9723cf654da056288d452185861e405
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e