Analysis
-
max time kernel
151s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 16:42
Static task
static1
Behavioral task
behavioral1
Sample
e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe
Resource
win10v2004-20220812-en
General
-
Target
e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe
-
Size
201KB
-
MD5
209e65b7789d334934a62b59aae55d61
-
SHA1
4563d5af13189d66dfe1c33eb144d2aa606746a3
-
SHA256
e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf
-
SHA512
1d8416c01a30449b38749745bc3d37d15306bd849d8d5c3c9a60f137961c0eea8e63544805120a3d29390d9abf8391f8089868d6995bf51a6f0d7bc65d1a5d77
-
SSDEEP
6144:Hza2Nj+MLxwkcWTq/81DDiSTz9nqEja3TXU0xtF2:HqEjk7l7F2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1328 security.exe 992 security.exe -
resource yara_rule behavioral1/memory/2012-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2012-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2012-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2012-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2012-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2012-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2012-108-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/992-110-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/992-112-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Security = "C:\\Users\\Admin\\AppData\\Roaming\\Security\\security.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1204 set thread context of 2012 1204 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 28 PID 1328 set thread context of 992 1328 security.exe 33 PID 1328 set thread context of 1492 1328 security.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe Token: SeDebugPrivilege 992 security.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1204 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 1328 security.exe 992 security.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2012 1204 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 28 PID 1204 wrote to memory of 2012 1204 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 28 PID 1204 wrote to memory of 2012 1204 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 28 PID 1204 wrote to memory of 2012 1204 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 28 PID 1204 wrote to memory of 2012 1204 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 28 PID 1204 wrote to memory of 2012 1204 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 28 PID 1204 wrote to memory of 2012 1204 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 28 PID 1204 wrote to memory of 2012 1204 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 28 PID 2012 wrote to memory of 460 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 29 PID 2012 wrote to memory of 460 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 29 PID 2012 wrote to memory of 460 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 29 PID 2012 wrote to memory of 460 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 29 PID 460 wrote to memory of 536 460 cmd.exe 31 PID 460 wrote to memory of 536 460 cmd.exe 31 PID 460 wrote to memory of 536 460 cmd.exe 31 PID 460 wrote to memory of 536 460 cmd.exe 31 PID 2012 wrote to memory of 1328 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 32 PID 2012 wrote to memory of 1328 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 32 PID 2012 wrote to memory of 1328 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 32 PID 2012 wrote to memory of 1328 2012 e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe 32 PID 1328 wrote to memory of 992 1328 security.exe 33 PID 1328 wrote to memory of 992 1328 security.exe 33 PID 1328 wrote to memory of 992 1328 security.exe 33 PID 1328 wrote to memory of 992 1328 security.exe 33 PID 1328 wrote to memory of 992 1328 security.exe 33 PID 1328 wrote to memory of 992 1328 security.exe 33 PID 1328 wrote to memory of 992 1328 security.exe 33 PID 1328 wrote to memory of 992 1328 security.exe 33 PID 1328 wrote to memory of 1492 1328 security.exe 34 PID 1328 wrote to memory of 1492 1328 security.exe 34 PID 1328 wrote to memory of 1492 1328 security.exe 34 PID 1328 wrote to memory of 1492 1328 security.exe 34 PID 1328 wrote to memory of 1492 1328 security.exe 34 PID 1328 wrote to memory of 1492 1328 security.exe 34 PID 1328 wrote to memory of 1492 1328 security.exe 34 PID 1328 wrote to memory of 1492 1328 security.exe 34 PID 1328 wrote to memory of 1492 1328 security.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe"C:\Users\Admin\AppData\Local\Temp\e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe"C:\Users\Admin\AppData\Local\Temp\e9b31f0af19eeba917b2a931b513af0190e6f991f8301f434c7ae253c2b321cf.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\AMULA.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Security" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Security\security.exe" /f4⤵
- Adds Run key to start application
PID:536
-
-
-
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:992
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵PID:1492
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD56f473a1ba53e043362047f72e20b34f4
SHA1e8f121a589e1207ed950453376ee1d21b1223835
SHA2565fbce2c77a90ba9edbcf60be3851ab81633b7c10b1babb624d475c7be589de4b
SHA512b4976d40bc708ae6cddf367a5382cd532e4cf235b848cdaa4e4d317e06d9126e50745a7772591bc21dc7380689f4399e57501b0aa73cd231bce32e22d53b0818
-
Filesize
201KB
MD5faf8739a60db5e03d0af01ddf0046386
SHA1fcf49b8627b4a1c17263321a61abe761dc61b483
SHA256ce0ac7b6e501bd28da96130efc5f1a3cefe7c7db235e8553f5789e44d8566f3e
SHA51220ee60a6d44f92ad56efd570099f4af8484a513704b3b96f8f99ecd357e86717b1cf05ddb88c3c0c4814c090dce67dd22aace30ac75ef6262a98bc658ea29e88
-
Filesize
201KB
MD5faf8739a60db5e03d0af01ddf0046386
SHA1fcf49b8627b4a1c17263321a61abe761dc61b483
SHA256ce0ac7b6e501bd28da96130efc5f1a3cefe7c7db235e8553f5789e44d8566f3e
SHA51220ee60a6d44f92ad56efd570099f4af8484a513704b3b96f8f99ecd357e86717b1cf05ddb88c3c0c4814c090dce67dd22aace30ac75ef6262a98bc658ea29e88
-
Filesize
201KB
MD5faf8739a60db5e03d0af01ddf0046386
SHA1fcf49b8627b4a1c17263321a61abe761dc61b483
SHA256ce0ac7b6e501bd28da96130efc5f1a3cefe7c7db235e8553f5789e44d8566f3e
SHA51220ee60a6d44f92ad56efd570099f4af8484a513704b3b96f8f99ecd357e86717b1cf05ddb88c3c0c4814c090dce67dd22aace30ac75ef6262a98bc658ea29e88
-
Filesize
201KB
MD5faf8739a60db5e03d0af01ddf0046386
SHA1fcf49b8627b4a1c17263321a61abe761dc61b483
SHA256ce0ac7b6e501bd28da96130efc5f1a3cefe7c7db235e8553f5789e44d8566f3e
SHA51220ee60a6d44f92ad56efd570099f4af8484a513704b3b96f8f99ecd357e86717b1cf05ddb88c3c0c4814c090dce67dd22aace30ac75ef6262a98bc658ea29e88
-
Filesize
201KB
MD5faf8739a60db5e03d0af01ddf0046386
SHA1fcf49b8627b4a1c17263321a61abe761dc61b483
SHA256ce0ac7b6e501bd28da96130efc5f1a3cefe7c7db235e8553f5789e44d8566f3e
SHA51220ee60a6d44f92ad56efd570099f4af8484a513704b3b96f8f99ecd357e86717b1cf05ddb88c3c0c4814c090dce67dd22aace30ac75ef6262a98bc658ea29e88
-
Filesize
201KB
MD5faf8739a60db5e03d0af01ddf0046386
SHA1fcf49b8627b4a1c17263321a61abe761dc61b483
SHA256ce0ac7b6e501bd28da96130efc5f1a3cefe7c7db235e8553f5789e44d8566f3e
SHA51220ee60a6d44f92ad56efd570099f4af8484a513704b3b96f8f99ecd357e86717b1cf05ddb88c3c0c4814c090dce67dd22aace30ac75ef6262a98bc658ea29e88
-
Filesize
201KB
MD5faf8739a60db5e03d0af01ddf0046386
SHA1fcf49b8627b4a1c17263321a61abe761dc61b483
SHA256ce0ac7b6e501bd28da96130efc5f1a3cefe7c7db235e8553f5789e44d8566f3e
SHA51220ee60a6d44f92ad56efd570099f4af8484a513704b3b96f8f99ecd357e86717b1cf05ddb88c3c0c4814c090dce67dd22aace30ac75ef6262a98bc658ea29e88
-
Filesize
201KB
MD5faf8739a60db5e03d0af01ddf0046386
SHA1fcf49b8627b4a1c17263321a61abe761dc61b483
SHA256ce0ac7b6e501bd28da96130efc5f1a3cefe7c7db235e8553f5789e44d8566f3e
SHA51220ee60a6d44f92ad56efd570099f4af8484a513704b3b96f8f99ecd357e86717b1cf05ddb88c3c0c4814c090dce67dd22aace30ac75ef6262a98bc658ea29e88