Analysis
-
max time kernel
50s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe
Resource
win10v2004-20221111-en
General
-
Target
2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe
-
Size
768KB
-
MD5
22df29ca44e19211d3630e84ec0eeb01
-
SHA1
ae81fa6e0f616f8c1ff8c284d793bd2b057bfd9e
-
SHA256
2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1
-
SHA512
4800b4275499b068ab2f4cebc6ed9e58f9dcd5955d2321b5e048e349c6ab2b501a8bed146fdf2cb60c39820676161ef7f39bf5c758455f27fb6383713004a59d
-
SSDEEP
12288:RCRSvpzh90Dft/dVYkk0DmPN7Z4AxH5t24VFLlfVoDh1ewE2HmwWqzIxLJIdT/Ps:RCRIpre/dVYw6YAF24Hmh1a2Gwxzq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 676 see.exe -
Loads dropped DLL 2 IoCs
pid Process 888 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe 888 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\thrue = "C:\\Users\\Admin\\AppData\\Roaming\\lanko\\see.exe" 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 888 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe 676 see.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 888 wrote to memory of 676 888 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe 28 PID 888 wrote to memory of 676 888 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe 28 PID 888 wrote to memory of 676 888 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe 28 PID 888 wrote to memory of 676 888 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe 28 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 1524 676 see.exe 29 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 652 676 see.exe 30 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 1368 676 see.exe 31 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 840 676 see.exe 32 PID 676 wrote to memory of 1464 676 see.exe 33 PID 676 wrote to memory of 1464 676 see.exe 33 PID 676 wrote to memory of 1464 676 see.exe 33 PID 676 wrote to memory of 1464 676 see.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe"C:\Users\Admin\AppData\Local\Temp\2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Roaming\lanko\see.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1524
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:652
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1368
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:840
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1464
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1736
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:892
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1064
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:812
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1304
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1800
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:752
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1264
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1484
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1860
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1992
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1588
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:916
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1508
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1532
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1672
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:744
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:944
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:384
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:960
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1724
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1676
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1536
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1444
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:852
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:528
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1528
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:548
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1608
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1516
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1936
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1468
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1988
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1480
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1052
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1944
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1372
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:976
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1864
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1224
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1700
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:680
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:784
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:672
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:364
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1696
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:2020
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1648
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1204
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:872
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1716
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:972
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1820
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768KB
MD522df29ca44e19211d3630e84ec0eeb01
SHA1ae81fa6e0f616f8c1ff8c284d793bd2b057bfd9e
SHA2562cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1
SHA5124800b4275499b068ab2f4cebc6ed9e58f9dcd5955d2321b5e048e349c6ab2b501a8bed146fdf2cb60c39820676161ef7f39bf5c758455f27fb6383713004a59d
-
Filesize
768KB
MD522df29ca44e19211d3630e84ec0eeb01
SHA1ae81fa6e0f616f8c1ff8c284d793bd2b057bfd9e
SHA2562cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1
SHA5124800b4275499b068ab2f4cebc6ed9e58f9dcd5955d2321b5e048e349c6ab2b501a8bed146fdf2cb60c39820676161ef7f39bf5c758455f27fb6383713004a59d
-
Filesize
768KB
MD522df29ca44e19211d3630e84ec0eeb01
SHA1ae81fa6e0f616f8c1ff8c284d793bd2b057bfd9e
SHA2562cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1
SHA5124800b4275499b068ab2f4cebc6ed9e58f9dcd5955d2321b5e048e349c6ab2b501a8bed146fdf2cb60c39820676161ef7f39bf5c758455f27fb6383713004a59d