Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 16:42
Static task
static1
Behavioral task
behavioral1
Sample
68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe
Resource
win10v2004-20221111-en
General
-
Target
68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe
-
Size
201KB
-
MD5
2269a8c31af792aa1b84945955d38331
-
SHA1
de54905cd3e556d5a280c6d78531fb23677f54c4
-
SHA256
68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636
-
SHA512
aeb02c7b18e91b782d302abcda5301cee3ad02fbec9fb63c86507d20d1bfb95b1d3bf31383a30bd9704dd7bef30ef1119358a19f67819596c8665e5517af2454
-
SSDEEP
6144:Hza2Nj+MLxwkcWTq/81DDiSTz9nqEja3TXU0xtF2:HqEjk7l7F2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 912 security.exe 588 security.exe -
resource yara_rule behavioral1/memory/1472-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1472-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1472-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1472-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1472-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1472-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1472-108-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/588-110-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/588-112-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Security = "C:\\Users\\Admin\\AppData\\Roaming\\Security\\security.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1972 set thread context of 1472 1972 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 28 PID 912 set thread context of 588 912 security.exe 33 PID 912 set thread context of 976 912 security.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe Token: SeDebugPrivilege 588 security.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1972 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 912 security.exe 588 security.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1472 1972 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 28 PID 1972 wrote to memory of 1472 1972 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 28 PID 1972 wrote to memory of 1472 1972 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 28 PID 1972 wrote to memory of 1472 1972 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 28 PID 1972 wrote to memory of 1472 1972 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 28 PID 1972 wrote to memory of 1472 1972 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 28 PID 1972 wrote to memory of 1472 1972 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 28 PID 1972 wrote to memory of 1472 1972 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 28 PID 1472 wrote to memory of 1600 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 29 PID 1472 wrote to memory of 1600 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 29 PID 1472 wrote to memory of 1600 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 29 PID 1472 wrote to memory of 1600 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 29 PID 1600 wrote to memory of 1412 1600 cmd.exe 31 PID 1600 wrote to memory of 1412 1600 cmd.exe 31 PID 1600 wrote to memory of 1412 1600 cmd.exe 31 PID 1600 wrote to memory of 1412 1600 cmd.exe 31 PID 1472 wrote to memory of 912 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 32 PID 1472 wrote to memory of 912 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 32 PID 1472 wrote to memory of 912 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 32 PID 1472 wrote to memory of 912 1472 68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe 32 PID 912 wrote to memory of 588 912 security.exe 33 PID 912 wrote to memory of 588 912 security.exe 33 PID 912 wrote to memory of 588 912 security.exe 33 PID 912 wrote to memory of 588 912 security.exe 33 PID 912 wrote to memory of 588 912 security.exe 33 PID 912 wrote to memory of 588 912 security.exe 33 PID 912 wrote to memory of 588 912 security.exe 33 PID 912 wrote to memory of 588 912 security.exe 33 PID 912 wrote to memory of 976 912 security.exe 34 PID 912 wrote to memory of 976 912 security.exe 34 PID 912 wrote to memory of 976 912 security.exe 34 PID 912 wrote to memory of 976 912 security.exe 34 PID 912 wrote to memory of 976 912 security.exe 34 PID 912 wrote to memory of 976 912 security.exe 34 PID 912 wrote to memory of 976 912 security.exe 34 PID 912 wrote to memory of 976 912 security.exe 34 PID 912 wrote to memory of 976 912 security.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe"C:\Users\Admin\AppData\Local\Temp\68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe"C:\Users\Admin\AppData\Local\Temp\68896b6a4590866ae77a661b5b95a5a101fc8f4065708408d20a63d0893d0636.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\KVSQU.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Security" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Security\security.exe" /f4⤵
- Adds Run key to start application
PID:1412
-
-
-
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:588
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵PID:976
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD56f473a1ba53e043362047f72e20b34f4
SHA1e8f121a589e1207ed950453376ee1d21b1223835
SHA2565fbce2c77a90ba9edbcf60be3851ab81633b7c10b1babb624d475c7be589de4b
SHA512b4976d40bc708ae6cddf367a5382cd532e4cf235b848cdaa4e4d317e06d9126e50745a7772591bc21dc7380689f4399e57501b0aa73cd231bce32e22d53b0818
-
Filesize
201KB
MD5c1a94ad3b0c4810814434cbb57b67568
SHA1f68a2dde37343b3ed42d654ee320dba8ebf77756
SHA256d8ff9ed2fe8d1de17e0d066116dc96c6de07c73d61df32154898ff9747bf13e9
SHA512aedb9eecb699b3720dc851067be6b3a52858d838a39766887fe1c613d282459ab672aac5404a0dbd10bd0df0161cd9a6f88938ec43f4511521f8fae7912ace61
-
Filesize
201KB
MD5c1a94ad3b0c4810814434cbb57b67568
SHA1f68a2dde37343b3ed42d654ee320dba8ebf77756
SHA256d8ff9ed2fe8d1de17e0d066116dc96c6de07c73d61df32154898ff9747bf13e9
SHA512aedb9eecb699b3720dc851067be6b3a52858d838a39766887fe1c613d282459ab672aac5404a0dbd10bd0df0161cd9a6f88938ec43f4511521f8fae7912ace61
-
Filesize
201KB
MD5c1a94ad3b0c4810814434cbb57b67568
SHA1f68a2dde37343b3ed42d654ee320dba8ebf77756
SHA256d8ff9ed2fe8d1de17e0d066116dc96c6de07c73d61df32154898ff9747bf13e9
SHA512aedb9eecb699b3720dc851067be6b3a52858d838a39766887fe1c613d282459ab672aac5404a0dbd10bd0df0161cd9a6f88938ec43f4511521f8fae7912ace61
-
Filesize
201KB
MD5c1a94ad3b0c4810814434cbb57b67568
SHA1f68a2dde37343b3ed42d654ee320dba8ebf77756
SHA256d8ff9ed2fe8d1de17e0d066116dc96c6de07c73d61df32154898ff9747bf13e9
SHA512aedb9eecb699b3720dc851067be6b3a52858d838a39766887fe1c613d282459ab672aac5404a0dbd10bd0df0161cd9a6f88938ec43f4511521f8fae7912ace61
-
Filesize
201KB
MD5c1a94ad3b0c4810814434cbb57b67568
SHA1f68a2dde37343b3ed42d654ee320dba8ebf77756
SHA256d8ff9ed2fe8d1de17e0d066116dc96c6de07c73d61df32154898ff9747bf13e9
SHA512aedb9eecb699b3720dc851067be6b3a52858d838a39766887fe1c613d282459ab672aac5404a0dbd10bd0df0161cd9a6f88938ec43f4511521f8fae7912ace61
-
Filesize
201KB
MD5c1a94ad3b0c4810814434cbb57b67568
SHA1f68a2dde37343b3ed42d654ee320dba8ebf77756
SHA256d8ff9ed2fe8d1de17e0d066116dc96c6de07c73d61df32154898ff9747bf13e9
SHA512aedb9eecb699b3720dc851067be6b3a52858d838a39766887fe1c613d282459ab672aac5404a0dbd10bd0df0161cd9a6f88938ec43f4511521f8fae7912ace61
-
Filesize
201KB
MD5c1a94ad3b0c4810814434cbb57b67568
SHA1f68a2dde37343b3ed42d654ee320dba8ebf77756
SHA256d8ff9ed2fe8d1de17e0d066116dc96c6de07c73d61df32154898ff9747bf13e9
SHA512aedb9eecb699b3720dc851067be6b3a52858d838a39766887fe1c613d282459ab672aac5404a0dbd10bd0df0161cd9a6f88938ec43f4511521f8fae7912ace61
-
Filesize
201KB
MD5c1a94ad3b0c4810814434cbb57b67568
SHA1f68a2dde37343b3ed42d654ee320dba8ebf77756
SHA256d8ff9ed2fe8d1de17e0d066116dc96c6de07c73d61df32154898ff9747bf13e9
SHA512aedb9eecb699b3720dc851067be6b3a52858d838a39766887fe1c613d282459ab672aac5404a0dbd10bd0df0161cd9a6f88938ec43f4511521f8fae7912ace61